Книги з теми "Sensitive date"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Sensitive date".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Знайти повний текст джерелаChristen, Peter, Thilina Ranbaduge, and Rainer Schnell. Linking Sensitive Data. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59706-1.
Повний текст джерелаPhotopoulos, Constantine. Managing catastrophic loss of sensitive data. Burlington, MA: Syngress Pub., 2008.
Знайти повний текст джерелаClaire, Levallois-Barth, ed. Sensitive data protection in the European Union. Bruxelles: Bruylant, 2007.
Знайти повний текст джерелаOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Знайти повний текст джерелаGreat Britain. Parliament. House of Commons. Second Standing Committee on Delegated Legislation. Draft Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. London: Stationery Office, 2002.
Знайти повний текст джерелаDaniel, Wayne W. Collecting sensitive data by randomized response: An annotated bibliography. 2nd ed. Atlanta, Ga: Georgia State Univ. Business Press, 1993.
Знайти повний текст джерелаComputer Security Analysts (Firm : Alexandria, Va.), ed. A Methodology for certifying sensitive computer applications within federal agencies. Alexandria, Va. (PO Box 10255, Alexandria 22310): Computer Security Analysts, 1986.
Знайти повний текст джерелаE, Tracy Paul, ed. Randomized response: A method for sensitive surveys. Beverly Hills: Sage Publications, 1986.
Знайти повний текст джерелаStaszkiewicz, Maddison. Using Online Surveys to Capture Time-Sensitive Data in a Low-Resource Setting. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529601831.
Повний текст джерелаN, Gibbs John, Lewis Marieke, Library of Congress. Federal Research Division, and United States. National Aeronautics and Space Administration. Office of Inspector General, eds. Laws governing the protection of sensitive but unclassified information: A report. Washington, D.C: Federal Research Division, Library of Congress, 2004.
Знайти повний текст джерелаMewes, Hans-Werner. Schnelle Identifizierung von Peptiden durch sensitive Bestimmung ihrer Aminosäurezusammensetzung und Zugriff auf Sequenzdatenbanken. Gauting bei München: Intemann, 1989.
Знайти повний текст джерелаUnited States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.
Знайти повний текст джерелаvan der Sloot, Bart, and Sascha van Schendel. The Boundaries of Data. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2024. http://dx.doi.org/10.5117/9789463729192.
Повний текст джерелаOffice, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.
Знайти повний текст джерелаNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Знайти повний текст джерелаN, Gibbs John, Lewis Marieke, and Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.
Знайти повний текст джерелаRees, Elaine. Threatened, endangered & sensitive species affected by livestock production: A preliminary survey of data available in the western states. Portland, Or: Audubon Society of Portland, 1993.
Знайти повний текст джерелаAlan, Cooper. The Mourne Environmentally Sensitive Area land use data base: Report to the Department of Agriculture for Northern Ireland. [Coleraine]: [Department of Environmental Studies, University of Ulster], 1988.
Знайти повний текст джерелаParagi, Beata. Challenges in Using Online Surveys for Research Involving Delicate/Sensitive Topics: Data Protection Practices of European NGOs Operating in the Global South. 1 Oliver’s Yard, 55 City Road, London EC1Y 1SP United Kingdom: SAGE Publications, Ltd., 2022. http://dx.doi.org/10.4135/9781529604146.
Повний текст джерелаUnited States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.
Знайти повний текст джерелаKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Знайти повний текст джерелаKlausner, Julie. I don't care about your band: What I learned from indie rockers, trust funders, pornographers, faux sensitive hipsters, felons, and other guys I've dated. New York: Gotham Books, 2010.
Знайти повний текст джерелаUnited States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.
Знайти повний текст джерелаManaging Catastrophic Loss of Sensitive Data. Elsevier, 2008. http://dx.doi.org/10.1016/b978-1-59749-239-3.x0001-6.
Повний текст джерелаMcNamara, Kathryn. Defense Data Network: usage sensitive billing. 1986.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2006. Stationery Office, The, 2006.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2009. Stationery Office, The, 2009.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2000. Stationery Office, The, 2000.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) Order 2012. Stationery Office, The, 2012.
Знайти повний текст джерелаNeumann, Caryn E. Sexual Crime. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216013532.
Повний текст джерелаFox, James A. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Знайти повний текст джерелаFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Знайти повний текст джерелаFox, James Alan. Randomized Response and Related Methods: Surveying Sensitive Data. SAGE Publications, Incorporated, 2015.
Знайти повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) Order 2002. Stationery Office, The, 2002.
Знайти повний текст джерелаStelzmann, Daniela, and Josephine Ischebeck, eds. Child Sexual Abuse and the Media. Nomos Verlagsgesellschaft mbH & Co. KG, 2022. http://dx.doi.org/10.5771/9783748904403.
Повний текст джерелаBritain, Great. Data Protection (Processing of Sensitive Personal Data) (Elected Representatives) (Amendment) Order 2010. Stationery Office, The, 2010.
Знайти повний текст джерелаBunner, James. Password Book: Sensitive Data in One Place / 110 Pages /. Independently Published, 2020.
Знайти повний текст джерелаCommittee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Знайти повний текст джерелаDaniel, Wayne W. Collecting Sensitive Data by Randomized Response: An Annotated Bibliography. 2nd ed. Georgia State Univ Pr, 1992.
Знайти повний текст джерелаRouting of Time-Sensitive Data in Mobile and HOC Networks. Storming Media, 2001.
Знайти повний текст джерелаDoing research on sensitive topics. London: Sage Publications, 1993.
Знайти повний текст джерелаSurvey methodology: An innovative technique for estimating sensitive survey items. Washington, D.C: The Office, 1999.
Знайти повний текст джерелаData acquisition system for linear position sensitive detector based neutron diffractometer. Mumbai: Bhabha Atomic Research Centre, 2003.
Знайти повний текст джерелаGiugni, Marco, and Maria Grasso, eds. The Oxford Handbook of Political Participation. Oxford University Press, 2022. http://dx.doi.org/10.1093/oxfordhb/9780198861126.001.0001.
Повний текст джерелаPhotopoulos, Constantine. Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals. Elsevier Science & Technology Books, 2011.
Знайти повний текст джерела