Data protection.
Overview
Works: | 83 works in 50 publications in 50 languages |
---|
Titles
Information security[electronic resource] :a manager's guide to thwarting data thieves and hackers /
by:
(Language materials, printed)
Collaborative financial infrastructure protection[electronic resource] :tools, abstractions, and middleware /
by:
(Language materials, printed)
Transactions on Data Hiding and Multimedia Security VII[electronic resource] /
by:
(Language materials, printed)
The economics of financial and medical identity theft[electronic resource] /
by:
(Language materials, printed)
A survey of data leakage detection and prevention solutions[electronic resource] /
by:
(Language materials, printed)
Mobile phone security and forensics[electronic resource] :a practical approach /
by:
(Language materials, printed)
Optimizing information security and advancing privacy assurance[electronic resource] :new technologies /
by:
(Language materials, printed)
Privacy protection measures and technologies in business organizations[electronic resource] :aspects and standards /
by:
(Language materials, printed)
Information security, coding theory and related combinatorics[electronic resource] :information coding and combinatorics /
by:
(Language materials, printed)
Information security management metrics[electronic resource] :a definitive guide to effective security monitoring and measurement /
by:
(Language materials, printed)
Advances in artificial intelligence for privacy protection and security[electronic resource] /
by:
(Language materials, printed)
Information security governance[electronic resource] :a practical development and implementation approach /
by:
(Language materials, printed)
Privacy solutions and security frameworks in information protection[electronic resource] /
by:
(Language materials, printed)
Security engineering for cloud computing[electronic resource] :approaches and tools /
by:
(Language materials, printed)
Social network engineering for secure web data and services[electronic resource] /
by:
(Language materials, printed)
Advanced persistent threat[electronic resource] :understanding the danger and how to protect your organization /
by:
(Language materials, printed)
Data hiding[electronic resource] :exposing concealed data in multimedia, operating systems, mobile devices, and network protocols /
by:
(Language materials, printed)
Data governance[electronic resource] :how to design, deploy, and sustain an effective data governance program /
by:
(Language materials, printed)
Data protection[electronic resource] :governance, risk management, and compliance /
by:
(Language materials, printed)
Total information risk management[electronic resource] :maximizing the value of data and information assets /
by:
(Language materials, printed)
Security de-engineering[electronic resource] :solving the problems in information risk management /
by:
(Language materials, printed)
Advances in information and computer security[electronic resource] :9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014 : proceedings /
by:
(Language materials, printed)
Architecting user-centric privacy-as-a-set-of-services[electronic resource] :digital identity-related privacy framework /
by:
(Language materials, printed)
Enhancing information security and privacy by combining biometrics with cryptography[electronic resource] /
by:
(Language materials, printed)
Attribute-based credentials for trust[electronic resource] :identity in the information society /
by:
(Language materials, printed)
Handbook of research on digital crime, cyberspace security, and information assurance /
by:
(Language materials, printed)
Information theoretic security[electronic resource] :7th international conference, ICITS 2013, Singapore, November 28-30, 2013 : proceedings /
by:
(Language materials, printed)
Passive and active measurement[electronic resource] :15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014 : proceedings /
by:
(Language materials, printed)
The privacy engineer's manifesto[electronic resource] :getting from policy to code to QA to value /
by:
(Language materials, printed)
Self- and co-regulation in cybercrime, cybersecurity and national security[electronic resource] /
by:
(Electronic resources)
Privacy in a digital, networked world[electronic resource] :technologies, implications and solutions /
by:
(Language materials, printed)
Cyber denial, deception and counter deception[electronic resource] :a framework for supporting active cyber defense /
by:
(Language materials, printed)
Mobile phone security and forensics[electronic resource] :a practical approach /
by:
(Language materials, printed)
Physical and data-link security techniques for future communication systems[electronic resource] /
by:
(Language materials, printed)
Data protection on the move[electronic resource] :current developments in ICT and privacy/data protection /
by:
(Language materials, printed)
Application of big data for national security[electronic resource] :a practitioner's guide to emerging technologies /
by:
(Electronic resources)
Risk centric threat modeling[electronic resource] :process for attack simulation and threat analysis /
by:
(Electronic resources)
Auditing cloud computing[electronic resource] :a security and privacy guide /
by:
(Electronic resources)
Virtuality and capabilities in a world of ambient intelligence[electronic resource] :new challenges to privacy and data protection /
by:
(Electronic resources)
Data thieves in action[electronic resource] :examining the international market for stolen personal information /
by:
(Electronic resources)
Elements of cloud storage security[electronic resource] :concepts, designs and optimized practices /
by:
(Electronic resources)
Online banking security measures and data protection[electronic resource] /
by:
(Language materials, printed)
Security solutions for hyperconnectivity and the Internet of things[electronic resource] /
by:
(Language materials, printed)
Innovative solutions for access control management[electronic resource] /
by:
(Language materials, printed)
The cloud security ecosystem[electronic resource] :technical, legal, business and management issues /
by:
(Electronic resources)
Information technology risk management and compliance in modern organizations[electronic resource] /
by:
(Electronic resources)
Network security and its impact on business strategy[electronic resource] /
by:
(Electronic resources)
Information security in diverse computing environments[electronic resource] /
by:
(Electronic resources)
Advanced methodologies and technologies in system security, information privacy, and forensics[electronic resource] /
by:
(Electronic resources)
Implementing computational intelligence techniques for security systems design[electronic resource] /
by:
(Electronic resources)
Advancements in security and privacy initiatives for multimedia images[electronic resource] /
by:
(Electronic resources)
Improving information security practices through computational intelligence[electronic resource] /
by:
(Electronic resources)
New methods and tools for intelligent data processing and information security systems[electronic resource] /
by:
(Electronic resources)
Privacy concerns surrounding personal information sharing on health and fitness mobile apps[electronic resource] /
by:
(Electronic resources)
Fraud prevention, confidentiality, and data security for modern businesses[electronic resource] /
by:
(Electronic resources)
Applications of machine learning and deep learning for privacy and cybersecurity[electronic resource] /
by:
(Electronic resources)
Cyber intelligence-driven risk[electronic resource] :how to build and use cyber intelligence for business risk decisions /
by:
(Electronic resources)
Security and privacy in the Internet of things[electronic resource] :architectures, techniques, and applications /
by:
(Electronic resources)
Mastering data security and governance :[a comprehensive guide to learn data security and governance] /
by:
(Language materials, printed)
Subjects