Livros sobre o tema "Privicy protection"

Siga este link para ver outros tipos de publicações sobre o tema: Privicy protection.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores livros para estudos sobre o assunto "Privicy protection".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.

1

Blume, Peter. Protection of informational privacy. Copenhagen: DJØF Pub., 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

South African Law Reform Commission. Privacy and data protection. [Pretoria: South African Law Reform Commission], 2003.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

South African Law Reform Commission. Privacy and data protection. Pretoria: South African Law Reform Commission, 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Saad, Abdul Raman. Personal data & privacy protection. Kelana Jaya, Selangor, Malaysia: Malayan Law Journal Sdn. Bhd., 2005.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Smiley, Sophie. Protecting our privacy. Cambridge: Independence, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Rodrigues, Rowena, e Vagelis Papakonstantinou, eds. Privacy and Data Protection Seals. The Hague: T.M.C. Asser Press, 2018. http://dx.doi.org/10.1007/978-94-6265-228-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

A, Caloyannides Michael, ed. Privacy protection and computer forensics. 2a ed. Boston: Artech House, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Kuschewsky, Monika. Data protection & privacy: Jurisdictional comparisons. London: Thomson Reuters, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

George, Yee, ed. Privacy protection for e-services. Hershey PA: Idea Group Pub., 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Bainbridge, David I. Data protection. Welwvyn Garden City: CLT Professional Pub., 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Spivet, Bonnie. Protecting your privacy online. New York, NY: PowerKids Press, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Wang, Hao. Protecting Privacy in China. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21750-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Inc, Regulatory Compliance Associates, ed. NAFCU's protecting member privacy. Austin, Tex: Sheshunoff Information Services/Thomson Financial, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Israel. Protection of Privacy Law, 5741-1981. 2a ed. [Haifa?]: A. Greenfield-A.G. Publications, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Jøsang, Audun, Lynn Futcher e Janne Hagen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78120-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Qu, Youyang, Mohammad Reza Nosouhi, Lei Cui e Shui Yu. Personalized Privacy Protection in Big Data. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3750-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Meng, Weizhi, Simone Fischer-Hübner e Christian D. Jensen, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06975-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Janczewski, Lech Jan, e Mirosław Kutyłowski, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99828-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Federrath, Hannes, e Dieter Gollmann, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Dhillon, Gurpreet, Fredrik Karlsson, Karin Hedström e André Zúquete, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22312-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Hoepman, Jaap-Henk, e Stefan Katzenbeisser, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Cuppens-Boulahia, Nora, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam e Thierry Sans, eds. ICT Systems Security and Privacy Protection. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55415-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

De Capitani di Vimercati, Sabrina, e Fabio Martinelli, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58469-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Hölbl, Marko, Kai Rannenberg e Tatjana Welzer, eds. ICT Systems Security and Privacy Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58201-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Liu, Xinxin, e Xiaolin Li. Location Privacy Protection in Mobile Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9074-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Elngar, Ahmed, Ambika Pawar e Prathamesh Churi. Data Protection and Privacy in Healthcare. Editado por Ahmed Elngar, Ambika Pawar e Prathamesh Churi. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

1943-, Rule James B., e Greenleaf G. W, eds. Global privacy protection: The first generation. Cheltenham, UK: Edward Elgar, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Meyer, Norbert, e Anna Grocholewska-Czuryło, eds. ICT Systems Security and Privacy Protection. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56326-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Peter, Carey. E-privacy and online data protection. London: Butterworths, 2002.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Israel. Protection of privacy law, 5741-1981. 3a ed. [Haifa]: A. Greenfield-A.G. Publications, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Kayser, Pierre. La protection de la vie privée. 2a ed. Aix-en-Provence: Presses universitaires d'Aix-Marseille, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Bainbridge, David I. EC data protection directive. London: Butterworths, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Institute, Pennsylvania Bar, ed. Privacy & security. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Wang, Hao. Protecting privacy in China: A research on China's privacy standards and the possibility of establishing the right to privacy and the information privacy protection legislation in modern China. Heidelberg: Springer, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

1960-, Maurer Urs, e Faruque Nadine 1960-, eds. Datenschutz =: Protection des données = Data protection. Basel: Helbing & Lichtenhahn, 1994.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Lauter, Kristin, Wei Dai e Kim Laine, eds. Protecting Privacy through Homomorphic Encryption. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77287-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Livraga, Giovanni. Protecting Privacy in Data Release. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16109-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Senior, Andrew, ed. Protecting Privacy in Video Surveillance. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-301-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Andrew, Senior, ed. Protecting privacy in video surveillance. Dordrecht: Springer, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Online privacy and business. San Diego, CA: ReferencePoint Press, Inc., 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Noon, E. Personal Privacy Protection Guide : A Practical Guide to Protecting Your Privacy. On One Inc, 1998.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Hallinan, Dara. Protecting Genetic Privacy in Biobanking through Data Protection Law. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192896476.001.0001.

Texto completo da fonte
Resumo:
Biobanks are critical infrastructure for medical research. Biobanks, however, are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25 May 2018, the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking. It argues that the substantive framework presented by the GDPR already offers an admirable baseline level of protection for the range of genetic privacy rights engaged by biobanking. The book further contends that while numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Protecting Genetic Privacy in Biobanking Through Data Protection Law. Oxford University Press, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Rule, James, e Graham Greenleaf. Global Privacy Protection. Edward Elgar Publishing, 2008. http://dx.doi.org/10.4337/9781848445123.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Protecting privacy. Oxford: Oxford University Press, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Santiago, J. K. !nternet Privacy Protection Guide. Boggy Cove Pub, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Wacks, Raymond. 6. The death of privacy? Oxford University Press, 2015. http://dx.doi.org/10.1093/actrade/9780198725947.003.0006.

Texto completo da fonte
Resumo:
Privacy is under attack from several quarters. The ‘war on terror’ has amplified this pressure. The Internet, increased surveillance, and sensationalist journalism seriously undermine individuals’ control over their private lives. Many advocates believe that the protection of privacy stands in need of urgent renewal. Has the Internet sounded privacy’s death knell? The rapid advance of information technology, especially the Internet, has generated widespread concern about protection of personal data, with many jurisdictions adopting data protection legislation. Ironically, technology generates both the malady and part of the cure. While the law is rarely an effective tool against the dedicated intruder, advances in protective software, along with fair information practices of the European Directive and laws of several jurisdictions, afford a rational and sound normative framework for the collection, use, and transfer of personal data. Some of these questions—likely to dominate 21st-century discussions of privacy—are considered in this concluding chapter.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Protecting Patron Privacy. Rowman & Littlefield Publishers, Incorporated, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Protecting Our Privacy. Independence Educational Publishers, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Beckstrom, Matthew. Protecting Patron Privacy. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798216002277.

Texto completo da fonte
Resumo:
Protect patron privacy and safeguard Internet usage using this how-to manual for creating a secure environment in your library. You'll learn how simple changes to your policies, procedures, and computer settings can ensure a private and safe research space for users. In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research―if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount importance, explains the applicable laws and regulations related to patron privacy, and delves into the mechanics of security breaches on public computers. The second half outlines the practical steps you can take to preserve the rights of library visitors by working with computer and mobile device configurations, network security settings, and special applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia