Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
1057 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Data protection in a profiled world
2. 
Cover image for Harbour protection through data fusion technologies
6. 
Cover image for Data protection : governance, risk management, and compliance
7. 
Cover image for Mastering system center data protection manager 2007
13. 
Cover image for Realization of data protection in health information systems : proceedings
16. 
Cover image for Genetic data and the law : a critical perspective on privacy protection
19. 
Cover image for Data mining X : data mining, protection, detection and other security technologies
20. 
Cover image for Data mining IX : data mining, protection, detection and other security technologies
21. 
Cover image for Digital data integrity : the evolution from passive protection to active management
22. 
Cover image for European data protection law : corporate compliance and regulation
23. 
Cover image for Data protection : a practical guide to UK and EU law
27. 
Cover image for Data protection: a guide for library and information
37. 
Cover image for DATA GOVERNANCE : HOW TO DESIGN, DEPLOY AND SUSTAIN AN EFFECTIVE DATA GOVERNANCE PROGRAM
38. 
Cover image for Data Privacy and GDPR Handbook
39. 
Cover image for CYBER INFLUENCE AND COGNITIVE THREATS
40. 
Cover image for Practical Power Plant Engineering : A Guide for Early Career Engineers
41. 
Cover image for Smart Data : State-of-the-Art Perspectives in Computing and Applications
43. 
Cover image for Introduction to renewable power systems and the environment with R
44. 
Cover image for CISO Compass : Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
46. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
51. 
Cover image for Metallurgy Technology and Materials VI : 6th International Conference on Metallurgy Technology and Materials (6th ICMTM 2018) : selected, peer reviewed papers from the 6th International Conference on Metallugy Technology and Materials (ICMTM2018), May 30-31, 2018, Xi'an, China
52. 
Cover image for Privacy and Security Policies in Big Data
53. 
Cover image for ARCHITECTURAL GRAPHIC STANDARDS
56. 
Cover image for Spark : Big Data Cluster Computing in Production
60. 
Cover image for Legal issues in information security
68. 
Cover image for Protocols and procedures of cryptography and network security
69. 
Cover image for Security policies and implementation issues
74. 
Cover image for High definition : zero tolerance in design and production
75. 
Cover image for Data Stewardship : an actionable guide to effective data management and data governance
80. 
Cover image for Introduction to computer and network security : navigating shades of gray
81. 
Cover image for Enterprise architecture and information assurance : developing a secure foundation
82. 
Cover image for Information security management handbook Volume 7
83. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
91. 
Cover image for Total information risk management : maximizing the value of data and information assets
92. 
Cover image for Analyzing security, trust, and crime in the digital world
94. 
Cover image for Responsive security  : be ready to be secure
96. 
Cover image for Online scheduling in manufacturing: a cumulative delay approach
105. 
Cover image for Case studies for ethics in academic research in the social sciences
108. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
109. 
Cover image for Recording, documentation, and information management for the conservation of heritage places. Guiding principles
116. 
Cover image for Conservation planning : shaping the future
117. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
119. 
Cover image for Pragmatic security metrics : applying metametrics to information security
120. 
Cover image for Metaheuristics for production scheduling
121. 
Cover image for Lining up data in ArcGIS : a guide to map projections
125. 
Cover image for Data governance : how to design, deploy, and sustain an effective data governance program
126. 
Cover image for Information security management handbook. Volume 5
128. 
Cover image for Information security management handbook
130. 
Cover image for IT governance : an international guide to data security and ISO27001/ISO27002
132. 
Cover image for Cyber security policy guidebook
133. 
Cover image for Advanced persistent threat : understanding the danger and how to protect your organization
134. 
Cover image for Information and communication technologies in healthcare
135. 
Cover image for A survey of data leakage detection and prevention solutions
136. 
Cover image for PCI compliance :  understand and implement effective PCI data security standard compliance
137. 
Cover image for The no-nonsense guide to legal issues in Web 2.0 and cloud computing
138. 
Cover image for Information security management handbook Volume 6
141. 
Cover image for Analyzing computer security : a threat/vulnerability/countermeasure approach
142. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
164. 
Cover image for The Essential Physics of Medical Imaging
165. 
Cover image for Pipeline planning and construction field manual
170. 
Cover image for Security strategy : from requirements to reality
172. 
Cover image for The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
175. 
Cover image for New technologies for digital crime and forensics : devices, applications, and software
176. 
Cover image for Auditing cloud computing : a security and privacy guide
177. 
Cover image for Orlicky's material requirements planning
179. 
Cover image for High voltage protection for telecommunications
182. 
Cover image for The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
184. 
Cover image for Asset data integrity is serious business
185. 
Cover image for Maintaining mission critical systems in a 24/7 environment
186. 
Cover image for Information security evaluation : a holistic approach
187. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
188. 
Cover image for Location-based management for construction : planning, scheduling and control
189. 
Cover image for Managing construction logistics
190. 
Cover image for Information communication technology law, protection, and access rights : global approaches and issues
191. 
Cover image for IT security metrics : a practical framework for measuring security & protecting data
194. 
Cover image for Collaborative computer security and trust management
196. 
Cover image for The executive MBA in information security
197. 
Cover image for Mobile device security : a comprehensive guide to securing your information in a moving world
198. 
Cover image for Industrial informatics design, use and innovation : perspectives and services
199. 
Cover image for Advances in artificial intelligence for privacy protection and security
202. 
Cover image for Lining up data in ArcGIS : a guide to map projections
215. 
Cover image for Computer relaying for power systems
216. 
Cover image for Computer crime
217. 
Cover image for MES guide for executives : why and how to select, implement, and maintain a manufacturing execution system
218. 
Cover image for Handbook of research on social and organizational liabilities in information security
219. 
Cover image for Handbook of research on secure multimedia distribution
220. 
Cover image for Expert SQL server 2008 encryption
225. 
Cover image for Oracle data guard 11g handbook
228. 
Cover image for Hacking exposed 6 : network security secrets and solutions
229. 
Cover image for Payment card industry data security standard handbook
232. 
Cover image for Information security management metrics : a definitive guide to effective security monitoring and measurement
233. 
Cover image for Global perspectives in information security : legal, social, and international issues
236. 
Cover image for CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
237. 
Cover image for Multimedia content encryption : techniques and applications
238. 
Cover image for Securing intellectual property : protecting trade secrets and other information assets
241. 
Cover image for Manufacturing automation technology
242. 
Cover image for Ethical, legal, and social issues in medical informatics
250. 
Cover image for Information technology law
251. 
Cover image for Information assurance architecture
252. 
Cover image for High performance through process excellence : from strategy to operations
253. 
Cover image for Privacy-preserving data mining : models and algorithms
256. 
Cover image for Construction supply chain economics
259. 
Cover image for Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings
261. 
Cover image for RFID in manufacturing
262. 
Cover image for Information rights in practice : the non-legal professional's guide
265. 
Cover image for Computational intelligence in information assurance and security
266. 
Cover image for Manufacturing execution systems - MES
267. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
268. 
Cover image for A guide to graphic print production
269. 
Cover image for Information security management handbook
270. 
Cover image for Simple computer security : disinfect your PC
272. 
Cover image for Information technologies in environmental engineering : ITEE 2007--Third International ICSC Symposium
274. 
Cover image for Frontiers in computing technologies for manufacturing applications
275. 
Cover image for Adobe digital video how-tos : 100 essential techniques with Adobe production studio
276. 
Cover image for Real world print production
277. 
Cover image for Disaster recovery : principles and practices
280. 
Cover image for Petroleum production engineering : a computer-assisted approach
282. 
Cover image for Cryptology unlocked
283. 
Cover image for PCI compliance : understand and implement effective PCI data security standard compliance
284. 
Cover image for Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
285. 
Cover image for FAST creativity & innovation : rapidly improving processes, product development and solving complex problems
286. 
Cover image for Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
289. 
Cover image for Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
290. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
291. 
Cover image for Fifth World Conference on Information Security Education proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
296. 
Cover image for Patriotic information systems
298. 
Cover image for Advances in enterprise information technology security
Go to:Search Results
|
Top of Page
|
Search Facets