Livros sobre o tema "Private Data Analysis"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Private Data Analysis".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Plotkin, Stephen. Private well water quality data bank feasibility analysis for Massachusetts. Amherst, MA: University of Massachusetts Private Well Water Quality Data Bank Feasiblity Study, 1989.
Encontre o texto completo da fonteBurnell, Derek. Investment expectations: A unit record analysis of data from the private new capital expenditure survey. Canberra: Australian Bureau of Statistics, 1993.
Encontre o texto completo da fonteAyele, Gashaw T. Do tax structures optimize private fixed investment in sub-Saharan Africa?: A data envelopment analysis. Addis Ababa, Ethiopia: The Horn Economic and Social Policy Institute, 2015.
Encontre o texto completo da fonteMario Viola de Azevedo Cunha. Market Integration Through Data Protection: An Analysis of the Insurance and Financial Industries in the EU. Dordrecht: Springer Netherlands, 2013.
Encontre o texto completo da fonteDa cheng qi ye yan jiu yuan. Min ying jing ji gai bian Zhongguo: Gai ge kai fang 40 nian min ying jing ji zhu yao shu ju jian ming fen xi = Private economy changes China : concise analysis of private economy data 40-years reform and opening up. Beijing Shi: She hui ke xue wen xian chu ban she, 2018.
Encontre o texto completo da fonteMal'shina, N., e Andrey Garnov. MODERN PRINCIPLES ANALYSIS OF RESOURCE FLOWS IN CRISIS CONDITIONS: CULTURE AND CREATIVE INDUSTRY. xxu: Academus Publishing, 2020. http://dx.doi.org/10.31519/978-1-4946-0018-1.
Texto completo da fonteLut, Yuliia. Privacy-Aware Data Analysis: Recent Developments for Statistics and Machine Learning. [New York, N.Y.?]: [publisher not identified], 2022.
Encontre o texto completo da fonteBruijn, Hans. The Governance of Privacy. NL Amsterdam: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463729673.
Texto completo da fonteSloot, Bart, e Aviva Groot, eds. The Handbook of Privacy Studies. NL Amsterdam: Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.
Texto completo da fonteMunir, Abu Bakar. Privacy and data protection: A comparative analysis with special reference to the Malaysian proposed law. Petaling Jaya, Selangor, Malaysia: Sweet & Maxwell Asia, 2002.
Encontre o texto completo da fonteCvetkov, Kalin. The impact of business process outsourcing on privacy and data protection: A thorough risk analysis. Oisterwijk, The Netherlands: Wolf Legal Publishers, 2014.
Encontre o texto completo da fonteEric, Hohl, ed. Data protection and Facebook: An empirical analysis of the role of consent in social networks. Berlin: Lit, 2012.
Encontre o texto completo da fonteWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Encontre o texto completo da fonteWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Encontre o texto completo da fonteWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, 2001.
Encontre o texto completo da fonteWartell, Julie. Privacy in the information age: A guide for sharing crime maps and spatial data. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001.
Encontre o texto completo da fonteMatthew, Wright, e SpringerLink (Online service), eds. Privacy Enhancing Technologies: 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteCristofaro, Emiliano. Privacy Enhancing Technologies: 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Encontre o texto completo da fonteCamenisch, Jan. Privacy and Identity Management for Life. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2011.
Encontre o texto completo da fonteSteven, Furnell, Theoharidou Marianthi e SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteChristof, Paar, e SpringerLink (Online service), eds. RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteMal'shina, Nataliya, e Andrey Garnov. Culture and creative industry: the control of flow processes. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1158704.
Texto completo da fonteBrown, Roger J. Private Real Estate Investment: Data Analysis and Decision Making. Elsevier Science & Technology Books, 2005.
Encontre o texto completo da fontePrivate real estate investment: Data analysis and decision making. Amsterdam: Elsevier Academic Press, 2005.
Encontre o texto completo da fonteMario Viola de Azevedo Cunha. Market Integration Through Data Protection: An Analysis of the Insurance and Financial Industries in the EU. Springer, 2015.
Encontre o texto completo da fonteKuner, Christopher, Lee A. Bygrave, Christopher Docksey e Laura Drechsler, eds. The EU General Data Protection Regulation (GDPR). Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198826491.001.0001.
Texto completo da fonteTransborder flow of personal data within the EC: A comparative analysis of the privacy statutes of the Federal Republic of Germany, France, the United Kingdom, and The Netherlands and their impact on the private sector. Deventer: Kluwer Law and Taxation Publishers, 1990.
Encontre o texto completo da fonteAkcinaroglu, Seden, e Elizabeth Radziszewski. Private Militaries and the Security Industry in Civil Wars. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197520802.001.0001.
Texto completo da fonteCowhey, Peter F., e Jonathan D. Aronson. Data Privacy. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190657932.003.0008.
Texto completo da fonteMatsumi, Hideyuki, Dara Hallinan, Diana Dimitrova, Eleni Kosta e Paul De Hert, eds. Data Protection and Privacy, Volume 16. Hart Publishing, 2024. http://dx.doi.org/10.5040/9781509975976.
Texto completo da fonteFast Software Encryption 16th International Workshop Fse 2009 Leuven Belgium February 2225 2009 Revised Selected Papers. Springer, 2009.
Encontre o texto completo da fonteEvans, Jeff, Sally Ruane e Humphrey Southall, eds. Data in Society. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447348214.001.0001.
Texto completo da fonteAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Incorporated, John, 2017.
Encontre o texto completo da fonteAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Limited, John, 2017.
Encontre o texto completo da fonteAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley & Sons, Incorporated, John, 2017.
Encontre o texto completo da fonteAttoh-Okine, Nii O. Big Data and Differential Privacy: Analysis Strategies for Railway Track Engineering. Wiley, 2017.
Encontre o texto completo da fonteRand, John, e Finn Tarp, eds. Micro, Small, and Medium Enterprises in Vietnam. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198851189.001.0001.
Texto completo da fonteEsayas, Samson Y. Data Privacy and Competition Law in the Age of Big Data. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198891420.001.0001.
Texto completo da fonteGhali, Sofiane, e Habib Zitouna. Labor Demand in Tunisia. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198799863.003.0002.
Texto completo da fonteHornuf, Lars, e Gregor Dorfleitner. FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations. Springer, 2019.
Encontre o texto completo da fonteKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer, 2013.
Encontre o texto completo da fonteKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer, 2013.
Encontre o texto completo da fonteKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer London, Limited, 2013.
Encontre o texto completo da fonteHornuf, Lars, e Gregor Dorfleitner. FinTech and Data Privacy in Germany: An Empirical Analysis with Policy Recommendations. Springer International Publishing AG, 2020.
Encontre o texto completo da fonteKindt, Els J. Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis. Springer Netherlands, 2016.
Encontre o texto completo da fonteKnaack, Peter. A Web without a Center. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190864576.003.0009.
Texto completo da fonteRao, C. R., Arijit Chaudhuri e Tasos C. Christofides. Data Gathering, Analysis and Protection of Privacy Through Randomized Response Techniques: Qualitative and Quantitative Human Traits. Elsevier Science & Technology, 2016.
Encontre o texto completo da fonteKukutai, Tahu. Indigenous Data Sovereignty: Toward an agenda. ANU Press, 2016.
Encontre o texto completo da fonteRoyal Society (Great Britain) Staff. Protecting Privacy in Practice: The Current Use, Development and Limits of Privacy Enhancing Technologies in Data Analysis. Royal Society, The, 2019.
Encontre o texto completo da fonteMicklitz, Hans-W., Oreste Pollicino, Amnon Reichman, Andrea Simoncini, Giovanni Sartor e Giovanni De Gregorio, eds. Constitutional Challenges in the Algorithmic Society. Cambridge University Press, 2021. http://dx.doi.org/10.1017/9781108914857.
Texto completo da fonte