Книги з теми "Sensitive information"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Sensitive information".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hearing on sensitive but not classified information. [Washington, D.C.]: U.S. National Commission on Libraries and Information Science, 1988.
Знайти повний текст джерелаPrime, Terence. Legal protection of commercially sensitive information and trade secrets. Sudbury, Suffolk: Monitor Press Ltd., 1999.
Знайти повний текст джерелаOffice, General Accounting. NASA aeronautics: Protecting sensitive technology : report to Congressional requesters. Washington, D.C: U.S. General Accounting Office, 1993.
Знайти повний текст джерелаUnited States. National Commission on Libraries and Information Science. Hearing on sensitive but not classified information: Library of Congress, Washington, D.C., Thursday, May 28, 1987. [Washington, D.C: U.S.G.P.O., 1988.
Знайти повний текст джерелаIFIP TC8/WG8.3 International Conference on Context-Sensitive Decision Support Systems (1998 Bled, Slovenia). Context sensitive decision support systems: IFIP TC8 / WG8.3 International Conference on Context-Sensitive Decision Support Systems, 13-15 July 1998, Bled, Slovenia. London: Chapman & Hall, 1998.
Знайти повний текст джерелаIntegrity, Victoria Office of Police. Report on the leak of a sensitive Victoria Police information report. Melbourne: Govt. Printer, 2005.
Знайти повний текст джерелаWorld Summit on Information Society Gender Caucus. Towards a gender sensitive information society: The history of World Summit on Information Society Gender Caucus. Johannesburg, South Africa: World Summit on Information Society Gender Caucus, 2005.
Знайти повний текст джерелаUnited States. Dept. of Energy. Office of Audit Services. Audit report: Protection of the Department of Energy's unclassified sensitive electronic information. [Washington, DC]: U.S. Dept. of Energy, Office of Inspector General, 2009.
Знайти повний текст джерелаNew York (State). Office of the State Comptroller. Division of State Services. Metropolitan Transportation Authority, controls over security-sensitive information for the Capital Projects Program. [Albany, NY: Office of the State Comptroller, Division of State Services, 2006.
Знайти повний текст джерелаN, Gibbs John, Lewis Marieke, and Library of Congress. Federal Research Division., eds. Laws and regulations governing the protection of sensitive but unclassified information, a report. Washington, DC: The Division, 2004.
Знайти повний текст джерелаCross-cultural technology design: Crafting culture-sensitive technology for local users. Oxford: Oxford University Press, 2012.
Знайти повний текст джерелаCommission, United States Nuclear Regulatory. Security policy for processing and handling of sensitive unclassified information in the AUTOS/Local Area Network environment. [Bethesda, Md.?]: U.S. Nuclear Regulatory Commission, Office of Information Resources Management, Division of Information Support Services, 1993.
Знайти повний текст джерелаOffice, United States Governemnt Accountability. Transportation Security Administration: Clear policies and oversight needed for designation of sensitive security information : report to Congressional Requesters. Washington, D.C: GAO, 2005.
Знайти повний текст джерелаUnited States. Government Accountability Office. Personal information: Key federal privacy laws do not require information resellers to safeguard all sensitive data : report to the Committee on Banking, Housing and Urban Affairs, U.S. Senate. [Washington, D.C.]: GAO, 2006.
Знайти повний текст джерелаIdentity theft: Recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005. Washington: U.S. G.P.O., 2006.
Знайти повний текст джерелаOffice, General Accounting. Environmental information: EPA could better address concerns about disseminating sensitive business information : report to the Chairman and Ranking Minority Member, Subcommittee on VA, HUD, and Independent Agencies, Committee on Appropriations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 1999.
Знайти повний текст джерелаOffenders, Canada Federal Ad Hoc Interdepartmental Working Group on Information Systems on Child Sex. Report of the Federal Ad Hoc interdepartmental Working Group on Information Systems on Child Sex Offenders: Screening of volunteers and employees in child-sensitive positions. [Ottawa]: Government of Canada, 1994.
Знайти повний текст джерелаCanada. Federal Ad Hoc Interdepartmental Working Group on Information Systems on Child Sex Offenders. Report of the Federal Ad hoc interdepartmental Working Group on Information Systems on Child Sex Offenders: Screening of volunteers and employees in child-sensitive positions. [Ottawa]: The Group, 1994.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Science, Space, and Technology (2011). Subcommittee on Space. NASA security: Assessing the agency's efforts to protect sensitive information : joint hearing before the Subcommittee on Space & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, second session, June 20, 2014. Washington: U.S. Government Printing Office, 2014.
Знайти повний текст джерелаExamining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information: Hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on examining the financial services industry's responsibilities and role in preventing identity theft and protecting sensitive financial information, September 22, 2005. Washington: U.S. G.P.O., 2006.
Знайти повний текст джерелаOffice, General Accounting. Computer security: DEA is not adequately protecting sensitive drug enforcement data : report to the Chairman, Government Information, Justice, and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1992.
Знайти повний текст джерелаOffice, General Accounting. Document security: Justice can improve its controls over classified and sensitive documents : report to the Chairman, Information, Justice, Transportation and Agriculture Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1993.
Знайти повний текст джерелаUnited States. Congress. House. Committee on Financial Services. Assessing data security: Preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. Washington: U.S. G.P.O., 2005.
Знайти повний текст джерелаContext sensitive health informatics: Human and sociotechnical approaches. Amsterdam: IOS Press, 2013.
Знайти повний текст джерелаRhodes, Keith A. Information security: The Melissa computer virus demonstrates urgent need for stronger protection over systems and sensitive data : statement of Keith A. Rhodes, Technical Director for Computers and Telecommunications, Accounting and Information Management Division, before the Subcommittee on Technology, Committee on Science, House of Representatives. Washington, D.C: The Office, 1999.
Знайти повний текст джерелаAgencies in peril: Are we doing enough to protect federal IT and secure sensitive information? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, second session, March 12, 2008. Washington: U.S. G.P.O., 2008.
Знайти повний текст джерелаDo cellular and other wireless devices interfere with sensitive medical equipment?: Hearing before the Information, Justice, Transportation, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Third Congress, second session, October 5, 1994. Washington: U.S. G.P.O., 1997.
Знайти повний текст джерелаHow secure is sensitive Commerce Department data and operations?: A review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001. Washington: U.S. G.P.O., 2001.
Знайти повний текст джерелаKEITH, Josh. Sensitive Compartmentalized Information : (born Classified). Independently Published, 2022.
Знайти повний текст джерелаUnderhill, William. Managing The Dissemination Of Price Sensitive Information. Gower Pub Co, 2005.
Знайти повний текст джерелаWidmeyer, George, and Vladislav Rajkovic. Context-Sensitive Decision Support Systems. Springer, 1998.
Знайти повний текст джерелаExchange, International Stock, ed. Guidance on the dissemination of price sensitive information. London: International Stock Exchange, 1995.
Знайти повний текст джерелаGuidance for Transportation Agencies on Managing Sensitive Information. Washington, D.C.: Transportation Research Board, 2005. http://dx.doi.org/10.17226/23417.
Повний текст джерелаCenter for National Threat Assessment Inc. Staff and American Board for Certification in Homeland Security Staff. Guide to the Sensitive Security Information Body of Knowledge. Taylor & Francis Group, 2016.
Знайти повний текст джерелаAmerican Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.
Знайти повний текст джерелаSensitive Security Information, Certified® (SSI) Body of Knowledge. CRC Press, 2016. http://dx.doi.org/10.1201/b19524.
Повний текст джерелаCommittee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Знайти повний текст джерелаAmerican Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.
Знайти повний текст джерелаAmerican Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.
Знайти повний текст джерелаAmerican Board American Board for Certification in Homeland Security. Sensitive Security Information, Certified® (SSI) Body of Knowledge. Taylor & Francis Group, 2018.
Знайти повний текст джерелаInsider trading: Coping with the use & abuse of market sensitive information. New York: Law & Business/Harcourt Brace Jovanovich, 1985.
Знайти повний текст джерелаCommittee on Banking Housing (senate), United States Senate, and United States United States Congress. Identity Theft: Recent Developments Involving the Security of Sensitive Consumer Information. Independently Published, 2019.
Знайти повний текст джерелаInsider Trading: Coping With the Use and Abuse of Market Sensitive Information. Aspen Law & Business, 1985.
Знайти повний текст джерелаThe Nebraska Health Information Project, 1996: Ambulatory care sensitive conditions, 1994-1995. [Lincoln]: The Dept., 1996.
Знайти повний текст джерелаSchnell, Rainer, Peter Christen, and Thilina Ranbaduge. Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing. Springer International Publishing AG, 2020.
Знайти повний текст джерелаSchnell, Rainer, Peter Christen, and Thilina Ranbaduge. Linking Sensitive Data: Methods and Techniques for Practical Privacy-Preserving Information Sharing. Springer International Publishing AG, 2021.
Знайти повний текст джерелаPrime, Terry. Legal Protection of Commercially Sensitive Information and Trade Secrets (Monitor Press Special Report). Monitor Press, 1998.
Знайти повний текст джерелаDavis, Paul, Walter Perry, John Hollywood, and David Manheim. Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence. RAND Corporation, 2016. http://dx.doi.org/10.7249/rr1200.
Повний текст джерелаWalter. Uncertainty-Sensitive Heterogeneous Information Fusion: Assessing Threat with Soft, Uncertain, and Conflicting Evidence. Ran, 2016.
Знайти повний текст джерелаAboh, Enoch. Information Structure. Edited by Caroline Féry and Shinichiro Ishihara. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199642670.013.004.
Повний текст джерела