Livros sobre o tema "Breaches"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Breaches".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Daswani, Neil, e Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Texto completo da fonteS, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Encontre o texto completo da fonteFoster, Peter C., Sara E. Cable, Kathleen M. Porter e Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Encontre o texto completo da fontePersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Encontre o texto completo da fonteArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Encontre o texto completo da fonteVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Texto completo da fonteWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Texto completo da fonteRita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Encontre o texto completo da fonteKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Encontre o texto completo da fonteGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Encontre o texto completo da fonteRussell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. Indianapolis, IA: New Riders, 2002.
Encontre o texto completo da fonteOmbudsman, Vanuatu Office of the. Public report on the alleged leadership code breaches by John William Timakata (former Public Prosecutor). [Port Vila, Vanuatu]: Republic of Vanuatu, Office of the Ombudsman, 1999.
Encontre o texto completo da fonteBelling, Detlev W. Legal Protection against Breaches of Duty on the Part of the German Works Council — A Fata Morgana? Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-56993-7.
Texto completo da fonteBridging Love's Breaches. iUniverse, Inc., 2004.
Encontre o texto completo da fonteY, Chow Stephen, Anthony Barbara B e Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Encontre o texto completo da fonteY, Chow Stephen, Anthony Barbara B e Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Encontre o texto completo da fonteDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Encontre o texto completo da fonteDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Encontre o texto completo da fonteFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Encontre o texto completo da fonteData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Encontre o texto completo da fonteCentre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Encontre o texto completo da fonteElbayadi, Moudy, e Neil Daswani. Big Breaches: Cybersecurity Lessons for Everyone. Apress L. P., 2021.
Encontre o texto completo da fonteFlanagin, Annette. Misappropriation: Plagiarism and Breaches of Confidentiality. Oxford University Press, 2009. http://dx.doi.org/10.1093/jama/9780195176339.022.164.
Texto completo da fonteKelty, Christopher M. Limn Number 8: Hacks, Leaks, and Breaches. Createspace Independent Publishing Platform, 2017.
Encontre o texto completo da fonteHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Encontre o texto completo da fonteHo, Jean. State Responsibility for Breaches of Investment Contracts. University of Cambridge ESOL Examinations, 2020.
Encontre o texto completo da fonteHo, Jean. State Responsibility for Breaches of Investment Contracts. Cambridge University Press, 2018.
Encontre o texto completo da fonteCommittee on Energy and Commerce, United States House of Representatives e United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Encontre o texto completo da fonteWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Encontre o texto completo da fonteHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Encontre o texto completo da fontePublishing, IT Governance. Managing Information Security Breaches: Studies from Real Life. IT Governance Ltd, 2015.
Encontre o texto completo da fonteMoore, Michelle. Cybersecurity Breaches and Issues Surrounding Online Threat Protection. IGI Global, 2017.
Encontre o texto completo da fonteScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Encontre o texto completo da fonteDanae, Azaria. 5 Responses to Breaches under the Law of Treaties. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198717423.003.0005.
Texto completo da fonteJustice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2015.
Encontre o texto completo da fonteRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteRicento, Thomas, Yael Peled e Peter R. Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2016.
Encontre o texto completo da fonteData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Encontre o texto completo da fonteRanjan, Sudhanshu. Justice, Judocracy and Democracy in India: Boundaries and Breaches. Taylor & Francis Group, 2014.
Encontre o texto completo da fonteCommittee on Financial Services, United States House of Representatives e United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Encontre o texto completo da fonteRicento, Thomas, Yael Peled e Peter Ives. Language Policy and Political Theory: Building Bridges, Assessing Breaches. Springer, 2015.
Encontre o texto completo da fonteInformation Security Breaches: Avoidance and Treatment Based on ISO27001. IT Governance Ltd, 2014.
Encontre o texto completo da fonteWalker, John, e Michael Krausz. True Cost of Information Security Breaches and Cyber Crime. IT Governance Ltd, 2013.
Encontre o texto completo da fonteLibrary, Harvard College, ed. Exposure or disclosure?: Breaches of confidentiality in 18th-century politics. [S.l.]: President and Fellows of Harvard College, 1997.
Encontre o texto completo da fonteData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Encontre o texto completo da fonteJeyanthi, N., e R. Thandeeswaran. Security Breaches and Threat Prevention in the Internet of Things. IGI Global, 2017.
Encontre o texto completo da fonteCombating Security Breaches and Criminal Activity in the Digital Sphere. IGI Global, 2016.
Encontre o texto completo da fonte