Добірка наукової літератури з теми "Data security and protection"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Data security and protection".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Data security and protection"
Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.
Повний текст джерелаBegum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.
Повний текст джерелаMALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.
Повний текст джерелаA. J., Geetha. "Data Security and Protection." Indian Journal of Computer Science 8, no. 5 (October 31, 2023): 38. http://dx.doi.org/10.17010/ijcs/2023/v8/i5/173323.
Повний текст джерелаIgnisca, Vira, and Danylo Vdovenko. "ANALYSIS OF METHODS DATA SECURITY." Information systems and technologies security, no. 1 (3-4) (2020): 52–56. http://dx.doi.org/10.17721/ists.2020.4.53-57.
Повний текст джерелаQureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.
Повний текст джерелаMartín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.
Повний текст джерелаHighland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.
Повний текст джерелаAtri, Preyaa. "Enhancing Big Data Security through Comprehensive Data Protection Measures: A Focus on Securing Data at Rest and In-Transit." International Journal of Computing and Engineering 5, no. 4 (May 24, 2024): 44–55. http://dx.doi.org/10.47941/ijce.1920.
Повний текст джерелаShahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.
Повний текст джерелаДисертації з теми "Data security and protection"
Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Повний текст джерелаDepartment of Computer Science
Ammar, Bassem AbuBakr. "Error protection and security for data transmission." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421640.
Повний текст джерелаOduyiga, Adeshola Oyesanya. "Security in Cloud Storage : A Suitable Security Algorithm for Data Protection." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34428.
Повний текст джерелаBenson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.
Повний текст джерелаMai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Повний текст джерелаTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Повний текст джерелаSalles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.
Повний текст джерелаThesis advisor(s): J. Bret Michael, Michael Capps, Don McGregor. Includes bibliographical references (p. 123-127). Also available online.
Cannon, Jennifer Elizabeth. "Strategies for Improving Data Protection to Reduce Data Loss from Cyberattacks." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7277.
Повний текст джерелаDe, Lange Joshua. "A framework for information security management in local government." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/7588.
Повний текст джерелаKane, Douglas Robert. "Web-based dissemination system for the Trusted Computing Exemlar [i.e. Exemplar] project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKane.pdf.
Повний текст джерелаThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 127-128). Also available online.
Книги з теми "Data security and protection"
Endrijonas, Janet. Data security. Rocklin, Calif: Prima Pub., 1995.
Знайти повний текст джерела1952-, Gordon John, ed. Practical data security. Aldershot, England: Ashgate, 1993.
Знайти повний текст джерелаFrank, Lars. EDP-security. Amsterdam: Elsevier Science, 1992.
Знайти повний текст джерелаBrocx, W. H. J. 1939-, ed. Data security manual: Guidelines and procedures for data protection. Dordrecht [Netherlands]: D. Riedel, 1985.
Знайти повний текст джерелаZiegler, Sébastien, ed. Internet of Things Security and Data Protection. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04984-3.
Повний текст джерелаAmerican Bar Association. Section of Antitrust Law., ed. Data security handbook. Chicago, Ill: ABA Section of Antitrust Law, 2008.
Знайти повний текст джерелаAtluri, Vijay. Security of Data and Transaction Processing. Boston, MA: Springer US, 2000.
Знайти повний текст джерелаY, Chow Stephen, Goldstone David, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Data security & identity theft. Boston, MA: MCLE, 2009.
Знайти повний текст джерелаY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Знайти повний текст джерелаY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Знайти повний текст джерелаЧастини книг з теми "Data security and protection"
Garbis, Jason, and Jerry W. Chapman. "Data Protection." In Zero Trust Security, 163–72. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_13.
Повний текст джерелаLenhard, Thomas H. "Data Protection and Data Security." In Data Security, 3–4. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35494-7_2.
Повний текст джерелаLakshmi, Vasantha. "Data Protection." In Beginning Security with Microsoft Technologies, 173–230. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4853-9_5.
Повний текст джерелаOts, Karl. "Workload Protection – Data." In Azure Security Handbook, 77–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7292-3_5.
Повний текст джерелаIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-1.
Повний текст джерелаIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_95-2.
Повний текст джерелаIslam, M. Nazrul. "Data Protection." In Encyclopedia of Security and Emergency Management, 223–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_95.
Повний текст джерелаWeber, Peter, Roland Gabriel, Thomas Lux, and Katharina Menke. "Data Security and Data Protection." In Basics in Business Informatics, 281–308. Wiesbaden: Springer Fachmedien Wiesbaden, 2022. http://dx.doi.org/10.1007/978-3-658-35859-4_11.
Повний текст джерелаLong, Ian. "Data Protection and Data Security." In The Complete Company Policies, 41–64. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003258995-7.
Повний текст джерелаDegoulet, Patrice, and Marius Fieschi. "Security and Data Protection." In Introduction to Clinical Informatics, 193–203. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-0675-0_15.
Повний текст джерелаТези доповідей конференцій з теми "Data security and protection"
Li, Yifeng. "Blockchain transaction data privacy protection scheme." In Fifth International Conference on Computer Communication and Network Security (CCNS 2024), edited by Zhiyong Xiong and Zhaolong Ning, 37. SPIE, 2024. http://dx.doi.org/10.1117/12.3038136.
Повний текст джерела"TOWARDS DATA PROTECTION COMPLIANCE." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002981802130216.
Повний текст джерелаShi, Yue. "Data Security and Privacy Protection in Public Cloud." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622531.
Повний текст джерелаSu, Chunli. "Big Data Security and Privacy Protection." In 2019 International Conference on Virtual Reality and Intelligent Systems (ICVRIS). IEEE, 2019. http://dx.doi.org/10.1109/icvris.2019.00030.
Повний текст джерелаAparajit, Srushti, Rashi Shah, Riddhi Chopdekar, and Rupali Patil. "Data Protection: The Cloud Security Perspective." In 2022 3rd International Conference for Emerging Technology (INCET). IEEE, 2022. http://dx.doi.org/10.1109/incet54531.2022.9825151.
Повний текст джерелаJiang, Yixiang, Yuangen Xu, Qi Xu, Limei Fang, and Cong Lin. "Tobacco Industry Data Security Protection System." In 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2019. http://dx.doi.org/10.1109/ccoms.2019.8821674.
Повний текст джерелаZhang, Dongpo. "Big Data Security and Privacy Protection." In 8th International Conference on Management and Computer Science (ICMCS 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icmcs-18.2018.56.
Повний текст джерелаVázquez-Naya, Jose. "Protection and security of medical data." In MOL2NET'21, Conference on Molecular, Biomedical & Computational Sciences and Engineering, 7th ed. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/mol2net-07-11848.
Повний текст джерелаBoehnen, Christopher, David Bolme, and Patrick Flynn. "Biometrics IRB best practices and data protection." In SPIE Defense + Security, edited by Ioannis A. Kakadiaris, Ajay Kumar, and Walter J. Scheirer. SPIE, 2015. http://dx.doi.org/10.1117/12.2181981.
Повний текст джерелаKan, Senwen, Jennifer Dworak, and James George Dunham. "Echeloned IJTAG data protection." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835558.
Повний текст джерелаЗвіти організацій з теми "Data security and protection"
Adams, C. Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC Editor, December 1998. http://dx.doi.org/10.17487/rfc2479.
Повний текст джерелаPark, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.
Повний текст джерелаStankovic, Mirjana, and Agustín Ignacio Filippo. Global Value Chain Data for Mexico in the Automotive and Electronics Sectors. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003664.
Повний текст джерелаGautrais, Vincent, and Nicolas Aubin. Assessment Model of Factors Relating to Data Flow: Instrument for the Protection of Privacy as well as Rights and Freedoms in the Development and Use of Artificial Intelligence. Observatoire international sur les impacts sociétaux de l'intelligence artificielle et du numérique, March 2022. http://dx.doi.org/10.61737/haoj6662.
Повний текст джерелаIdris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), July 2021. http://dx.doi.org/10.19088/k4d.2021.103.
Повний текст джерелаDeb, Shourjya, and Virginie Baudais. The Challenges of Data Collection in Conflict-affected Areas: A Case Study in the Liptako-Gourma Region. Stockholm International Peace Research Institute, October 2022. http://dx.doi.org/10.55163/vwim3307.
Повний текст джерелаAuthor, Not Given. Y-12 Groundwater Protection Program Calendar Year 2000 Groundwater Monitoring Data Evaluation Report for the Upper East Fork Poplar Creek Hydrogeologic Regime at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/788789.
Повний текст джерелаAmarante, Verónica, Rodrigo Arim, and Andrés Dean. Protecting Workers against Unemployment in Uruguay. Inter-American Development Bank, October 2011. http://dx.doi.org/10.18235/0011349.
Повний текст джерелаRosenthal, David, Peter Samsel, and Cheryl Barbasch. Information Tools for Security Protection. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408503.
Повний текст джерелаLewis, Dustin, Radhika Kapoor, and Naz Modirzadeh. Advancing Humanitarian Commitments in Connection with Countering Terrorism: Exploring a Foundational Reframing concerning the Security Council. Harvard Law School Program on International Law and Armed Conflict, December 2021. http://dx.doi.org/10.54813/uzav2714.
Повний текст джерела