Data Processing Written Communication
Computer keystroke logging and writing : methods and applications / edited by Kirk P.H. Sullivan, Eva
P211.4 .C66 2006eb
Bestseller
2006
Observing writing : insights from keystroke logging and handwriting / edited by Eva Lindgren, Kirk P.
P211.4 .O27 2019
Bestseller
2019
Writing and digital media / edited by Luuk van Waes, Mariëlle Leijten, Christine M. Neuwirth.
P211 .W75 2006
Bestseller
2006
Data Processing X Rays Diffraction
The Rietveld method / edited by R.A. Young.
QD945 .R53 1993
;
Moore Stacks:Available
Book
1993
Data Processsing English Language
Corpus linguistics on the move : exploring and understanding English through corpora / edited by Mari
P128.C68 C677 2016
Bestseller
2016
Data Processsing English Literature History And Criticism
Aspects of transnational and indigenous cultures / edited by Hsinya Huang and Clara Shu-Chun Chang.
PR99 .A874 2014eb
Bestseller
2014
Data protection
--
3 Related Subjects
Data protection.
Advances in artificial intelligence for privacy protection and security / editors, Agusti Solanas, An
QA76.9.A25 A356 2010eb
Bestseller
2010
Advances in security information management : perceptions and outcomes / Guillermo Suárez de Tangil a
QA76.9.A25 A376 2013eb
Bestseller
2013
Anonymity / Alison Macrina and Talya Cooper.
Z678.93.P83
Bestseller
2019
The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big
TK5105.875.I57 M58 2017
;
Moore Stacks:Available
Book
2017
78 additional entries
Data protection -- Asia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh85008606-781 : United States.
Asia : the cyber security battleground: hearing before the Subcommittee on Asia and the Pacific of th
Book
2013
Data protection -- Australia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79021326-781
Indigenous data sovereignty : toward an agenda / edited by Tahu Kukutai and John Taylor.
KU519.I64 I527 2016
Bestseller
2016
Data protection -- Case studies. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99001484 : Krausz, Michael.
The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.
QA76.9.A25 K732 2013eb
Bestseller
2013
Data protection -- Congresses.
Frontiers of engineering : reports on leading-edge engineering from the 2015 symposium / National Aca
TK5105.59 .U85 2015
Bestseller
2016
Identity, security and democracy : the Wider social and ethical implications of automated systems for
TK7882.B56 N38 2009eb
Bestseller
2009
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses / edited by Mehmet Nesi
HV6431 .N38375 2014eb
Bestseller
2015
Use of risk analysis in computer-aided persuasion / edited by Ekrem Duman and Amir F. Atiya.
TK5105.59 .N38 2011
Bestseller
2011
Visions of privacy : policy choices for the digital age / edited by Colin J. Bennett and Rebecca Gran
JC596 .V57 1999eb
Bestseller
1999
Data protection -- Costs. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99004947 : Dertouzos, James N.,
The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. L
HV6773 .D47 1999eb
Bestseller
1999
Data protection -- Czech Republic. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n90718759-781 : Polčák, Radim,
Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák and other
KJP5407.8.C65
Bestseller
2016
Data protection -- Economic aspects.
Cybersecurity in Business Valuation : Addressing the Impact of Data Breaches on Value (a BVR Briefing
HF5548.37 .C93 2020
Bestseller
2020
Too smart : how digital capitalism is extracting data, controlling our lives, and taking over the wor
HM846 .S23 2020eb
Bestseller
2020
The true cost of information security breaches and cyber crime / Michael Krausz, John Walker.
QA76.9.A25 K732 2013eb
Bestseller
2013
Data protection -- Evaluation.
ISO27001:2013 Assessments Without Tears.
HF5548.37
Bestseller
ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment /
HF5548.37 .H66 2014eb
Bestseller
2014
ISO27001/ISO27002 : un guide de poche / Alan Calder.
QA76.9.A25 .C353 2017
Bestseller
2017
ISO27001/ISO27002 : una guía de bolsillo / Alan Calder.
HF5548.37 .C35 2017eb
Bestseller
2017
Risk Assessment for Asset Owners : a Pocket Guide.
HF5548.37 .C351 2007eb
Bestseller
2007
Data protection -- Government policy -- United States.
Addressing the threat posed by WeChat, and taking additional steps to address the national emergency
E-Gov Document
2020
Better administration of Automated Targeting System controls can further protect personally identifia
E-Gov Document
2007
Consumer data privacy in a networked world : a framework for protecting privacy and promoting innovat
E-Gov Document
2012
Consumer data security and the credit bureaus : hearing before the Committee on Banking, Housing, and
KF26 .B39 2017t
E-Gov Document
2018
19 additional entries
Data protection -- Great Britain. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79023147-781 : Webster, Mandy.
Data protection for the HR manager / Mandy Webster.
HF5549.2.G7 W43 2003eb
Bestseller
2003
Data protection -- Handbooks, manuals, etc.
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital
HD49 .W36 2004
;
Moore Stacks:Available
Book
2004
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital
HD49
Bestseller
2018
Information security management handbook / edited by Harold F. Tipton, Micki Krause.
QA76.9.A25 I54165 2007
;
Moore Stacks:Available
Book
2007
Data protection -- International cooperation. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh00006352 : Conference of European Statisticians.
Managing statistical confidentiality & microdata access : principles and guidelines of good practice
HA34 .C655 2007eb
Bestseller
2007
Data protection Law and legislation -- See Also Privacy, Right of
Data protection -- Law and legislation.
Borders in cyberspace : information policy and the global information infrastructure / edited by Bria
K4305.4 .B67 1997eb
Bestseller
1997
Chokepoints : global private regulation on the Internet / Natasha Tusikov.
TK5105.8854 .T877 2017
Bestseller
2017
Digital Death, Digital Assets and Post-Mortem Privacy [electronic resource].
K3264.C65
Bestseller
2022
The fundamental right to data protection : normative value in the context of counter-terrorism survei
K3264.C65
Bestseller
2017
15 additional entries
Data protection -- Law and legislation -- Canada. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n79007233-781 : Flaherty, David H.,
Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canad
K3264.C65 F56 1989
Bestseller
1989
Data protection -- Law and legislation -- Case studies. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/subjects/sh99001484 : Oppenheim, Charles.
The no-nonsense guide to legal issues in Web 2.0 and cloud computing / Charles Oppenheim.
ZA3075 .O67 2012eb
Bestseller
2012
Data protection -- Law and legislation -- England.
Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri
KJC1410
Bestseller
2018
Data profiling and insurance law / Brendan McGurk.
KD1859 .M38 2019
Bestseller
2019
Data protection law for employers : a specially commissioned report / Susan Singleton.
KD3097 .S56 2003eb
Bestseller
2003
Data protection -- Law and legislation -- Europe.
Privacy in the information age / Fred H. Cate.
KF1263.C65 C38 1997
;
Moore Stacks:Available
Book
1997
Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canad
K3264.C65 F56 1989
Bestseller
1989
Data protection -- Law and legislation -- European Union countries.
Being profiled : cogitas ergo sum : 10 years of 'profiling the European citizen' / Emre Bayamlioğu, I
K487.T4 B45 2018eb
Bestseller
2018
Civil liberties : overview, issues and trends / Stefan Connell, editor.
JC596
Bestseller
2018
Consent in European Data Protection Law.
KJE6071 .K676 2013
Bestseller
2013
Data protection and taxpayers' rights : challenges created by automatic exchange of information / Vik
KJE6071 .W64 2018
Bestseller
2018
15 additional entries
Data protection -- Law and legislation -- Germany.
Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri
KJC1410
Bestseller
2018
After the Stasi : collaboration and the struggle for sovereign subjectivity in the writing of German
KKA5246 .R56 2015
Bestseller
2015
Der Grundsatz digitaler Souveränität : eine Untersuchung zur Zulässigkeit des Einbindens privater IT-
KK6071.5 .E76 2020eb
Bestseller
2020
Netzpolitik : Freiheit und Rechtsschutz im Internet / Prof. Dr. Hans Peter Bull.
KK164.C66 B85 2013eb
Bestseller
2013
Privatheit wider Willen? : Verhinderung informationeller Preisgabe im Internet nach deutschem und US-
K3264.C65
Bestseller
2015-
Data protection -- Law and legislation -- Great Britain.
Cornerstone on Information Law / Damien Welfare.
KD3756
Bestseller
2019
Data protection for the HR manager / Mandy Webster.
HF5549.2.G7 W43 2003eb
Bestseller
2003
Essential law for information professionals / Paul Pedley.
KD3756 .P43 2019
Bestseller
2019
Information law : compliance for librarians, knowledge managers and information professionals / Charl
K87
Bestseller
2019
2 additional entries
Data protection -- Law and legislation -- Netherlands.
Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri
KJC1410
Bestseller
2018
The Dutch implementation of the data retention directive : on the storage and use of telephone and in
KKM3042 .O35 2014eb
Bestseller
2014
Data protection -- Law and legislation -- North Macedonia. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n2019008836-781
Defense : protection of information : agreement between the United States of America and North Macedo
E-Gov Document
2022
Data protection -- Law and legislation -- Slovakia. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n50075233-781
Defense : protection of information : agreement between the United States of America and the Slovak R
E-Gov Document
2022
Data protection -- Law and legislation -- United States.
2009 FISMA executive summary report.
E-Gov Document
2010
American Security Drone Act of 2020 : report of the Committee on Homeland Security and Governmental A
KF31 .H65 2020o
E-Gov Document
2020
American Security Drone Act of 2021 : report of the Committee on Homeland Security and Governmental A
E-Gov Document
2023
Balancing liberty, privacy, and security with intelligence capabilities : analyses and recommendation
KF4850
Bestseller
2014
70 additional entries
Data protection -- Law and legislation -- United States -- Popular works. / https://id.loc.gov/authorities/subjects/sh2008102020 https://id.loc.gov/authorities/subjects/sh99001720 : Jasper, Margaret C.
Privacy and the Internet : your expectations and rights under the law / revised and updated by Margar
KF1263.C65 J38 2009
;
Moore Stacks:Available
Book
2009
Data protection -- Management. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh2002007911 : Stanton, Jeffrey M.,
The visible employee : using workplace monitoring and surveillance to protect information assets--wit
HF5549.5.E37 S73 2006eb
Bestseller
2006
Data protection manager.
Microsoft System Center Data Protection Manager 2012.
QA76.9.D348
Bestseller
2013
Microsoft System Center Data Protection Manager Cookbook : Maximize Storage Efficiency, Performance,
QA76.9.D348
Bestseller
2018
Data protection manager -- Handbooks, manuals, etc. / https://id.loc.gov/authorities/names/n2007075165 https://id.loc.gov/authorities/subjects/sh99001300 : Buchanan, Steve.
Microsoft Data Protection Manager 2010 : a practical, step-by-step guide to planning deployment, inst
QA76.9.D348 B83 2011eb
Bestseller
2011
Data protection -- Mexico. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n81013960-781
El derecho a la información y datos personales en México : una vision comparada con el sistema intera
KGF3015
Bestseller
2018
Data protection -- New Zealand. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79021322-781
Indigenous data sovereignty : toward an agenda / edited by Tahu Kukutai and John Taylor.
KU519.I64 I527 2016
Bestseller
2016
Data protection -- Security measures. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99005297 : United States.
Progress has been made in securing laptops and wireless networks at FEMA / Department of Homeland Sec
E-Gov Document
2012
Data protection -- Security measures -- United States.
Audit of NRC's ongoing eligibility for access authorization (OIG-13-A-22) / U.S. Nuclear Regulatory C
E-Gov Document
2013
DHS can take actions to address its additional cybersecurity responsibilities / Department of Homelan
E-Gov Document
2013
Transportation Security Administration has taken steps to address the insider threat but challenges r
E-Gov Document
2012
Data protection -- Slovakia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n50075233-781 : Polčák, Radim,
Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák and other
KJP5407.8.C65
Bestseller
2016
Data protection -- Software. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99001417 : Hunter, Laura E.
Configuring Symantec antivirus / Laura E. Hunter [and others] ; Robert J. Shimonski, technical editor
QA76.76.C68 H86 2003eb
Bestseller
2003
Data protection -- Standards.
Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys.
QA76.9.A25 H855 2016
Bestseller
2016
Information security risk management for ISO 27001/ISO 27002 / Alan Calder, Steve G. Watkins.
HF5548.37
Bestseller
2019
An Introduction to Information Security and ISO27001 : 2013.
QA76.9.A25 .W845 2013
Bestseller
2013
ISO 9001 : a pocket guide / Steve Watkins.
TS156.6 .W38 2016eb
Bestseller
2016
11 additional entries
Data protection -- Technological innovations. : Mehan, Julie E.,
Artificial intelligence ethical, social and security impacts for the present and the future / Julie M
Q334.7
Bestseller
2022
Data protection -- United States.
After the breach : the monetization and illicit use of stolen data : hearing before the Subcommittee
KF27 .B58 2018
E-Gov Document
2018
Artificial intelligence and human rights : hearing before the Subcommittee on Human Rights and the La
E-Gov Document
2024
Assessment of the SEC's privacy program.
E-Gov Document
2010
Consumer attitudes toward data breach notifications and loss of personal information / Lillian Ablon,
HC79.C63 A25 2016
Bestseller
2016
30 additional entries
Data protection -- United States -- Encyclopedias. / https://id.loc.gov/authorities/subjects/sh2008117500 https://id.loc.gov/authorities/subjects/sh99001614
Privacy rights in the digital age / editor, Christopher T. Anglim, JD ; advisory editor, Jane E. Kirt
KF1263.C65 P747 2015eb
Bestseller
2016
Data recovery (Computer science)
Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; J
TK5105.885.G66
Bestseller
2011
Business resumption planning / Edward S. Devlin [and others].
HD49 .B87 2005eb
Bestseller
2005
Data center virtualization certification, VCP6.5-DCV exam guide : everything you need to achieve 2V0-
QA76.9.V5
Bestseller
2018
Disaster recovery and business continuity : a quick guide for organisations and business managers / T
QA76.9.D348
Bestseller
2014
16 additional entries
Data recovery (Computer science) -- Congresses. / https://id.loc.gov/authorities/subjects/sh88005793 https://id.loc.gov/authorities/subjects/sh99001533 : Johnson, Anne Frances,
Recoverability as a first-class security objective : proceedings of a workshop / Anne Frances Johnson
QA76.9.D348
Bestseller
2018
Data recovery (Computer science) -- Planning. / https://id.loc.gov/authorities/subjects/sh88005793 https://id.loc.gov/authorities/subjects/sh2002006228
Technology disaster response and recovery planning : a LITA guide / edited by Mary Mallery.
Z679.7 T43 2015eb
Bestseller
2015
Data recovery (Computer science) -- Planning -- Handbooks, manuals, etc.
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital
HD49 .W36 2004
;
Moore Stacks:Available
Book
2004
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital
HD49
Bestseller
2018
Save Marked Records
Save to List