Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Subjects are:
Result page:  Prev Next  
Mark   Media Year
Data Processing Written Communication    
      Computer keystroke logging and writing : methods and applications / edited by Kirk P.H. Sullivan, Eva P211.4 .C66 2006eb   Bestseller
BestsellerE-book
2006
      Observing writing : insights from keystroke logging and handwriting / edited by Eva Lindgren, Kirk P. P211.4 .O27 2019   Bestseller
BestsellerE-book
2019
      Writing and digital media / edited by Luuk van Waes, Mariëlle Leijten, Christine M. Neuwirth. P211 .W75 2006   Bestseller
BestsellerE-book
2006
Data Processing X Rays Diffraction      
      The Rietveld method / edited by R.A. Young. QD945 .R53 1993 ; Moore Stacks:Available   book
BookPrinted Material
1993
Data Processsing English Language      
      Corpus linguistics on the move : exploring and understanding English through corpora / edited by Mari P128.C68 C677 2016   Bestseller
BestsellerE-book
2016
Data Processsing English Literature History And Criticism      
      Aspects of transnational and indigenous cultures / edited by Hsinya Huang and Clara Shu-Chun Chang. PR99 .A874 2014eb   Bestseller
BestsellerE-book
2014
  Data protection -- 3 Related Subjects    
Data protection.    
      Advances in artificial intelligence for privacy protection and security / editors, Agusti Solanas, An QA76.9.A25 A356 2010eb   Bestseller
BestsellerE-book
2010
      Advances in security information management : perceptions and outcomes / Guillermo Suárez de Tangil a QA76.9.A25 A376 2013eb   Bestseller
BestsellerE-book
2013
      Anonymity / Alison Macrina and Talya Cooper. Z678.93.P83   Bestseller
BestsellerE-book
2019
      The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big TK5105.875.I57 M58 2017 ; Moore Stacks:Available   book
BookPrinted Material
2017
78 additional entries    
Data protection -- Asia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh85008606-781 : United States.     
      Asia : the cyber security battleground: hearing before the Subcommittee on Asia and the Pacific of th   book
BookPrinted Material
2013
Data protection -- Australia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79021326-781     
      Indigenous data sovereignty : toward an agenda / edited by Tahu Kukutai and John Taylor. KU519.I64 I527 2016   Bestseller
BestsellerE-book
2016
Data protection -- Case studies. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99001484 : Krausz, Michael.     
      The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. QA76.9.A25 K732 2013eb   Bestseller
BestsellerE-book
2013
Data protection -- Congresses.    
      Frontiers of engineering : reports on leading-edge engineering from the 2015 symposium / National Aca TK5105.59 .U85 2015   Bestseller
BestsellerE-book
2016
      Identity, security and democracy : the Wider social and ethical implications of automated systems for TK7882.B56 N38 2009eb   Bestseller
BestsellerE-book
2009
      Terrorist use of cyberspace and cyber terrorism : new challenges and reponses / edited by Mehmet Nesi HV6431 .N38375 2014eb   Bestseller
BestsellerE-book
2015
      Use of risk analysis in computer-aided persuasion / edited by Ekrem Duman and Amir F. Atiya. TK5105.59 .N38 2011   Bestseller
BestsellerE-book
2011
      Visions of privacy : policy choices for the digital age / edited by Colin J. Bennett and Rebecca Gran JC596 .V57 1999eb   Bestseller
BestsellerE-book
1999
Data protection -- Costs. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99004947 : Dertouzos, James N.,     
      The economic costs and implications of high-technology hardware theft / James N. Dertouzos, Eric V. L HV6773 .D47 1999eb   Bestseller
BestsellerE-book
1999
Data protection -- Czech Republic. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n90718759-781 : Polčák, Radim,     
      Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák and other KJP5407.8.C65   Bestseller
BestsellerE-book
2016
Data protection -- Economic aspects.    
      Cybersecurity in Business Valuation : Addressing the Impact of Data Breaches on Value (a BVR Briefing HF5548.37 .C93 2020   Bestseller
BestsellerE-book
2020
      Too smart : how digital capitalism is extracting data, controlling our lives, and taking over the wor HM846 .S23 2020eb   Bestseller
BestsellerE-book
2020
      The true cost of information security breaches and cyber crime / Michael Krausz, John Walker. QA76.9.A25 K732 2013eb   Bestseller
BestsellerE-book
2013
Data protection -- Evaluation.    
      ISO27001:2013 Assessments Without Tears. HF5548.37   Bestseller
BestsellerE-book
      ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment / HF5548.37 .H66 2014eb   Bestseller
BestsellerE-book
2014
      ISO27001/ISO27002 : un guide de poche / Alan Calder. QA76.9.A25 .C353 2017   Bestseller
BestsellerE-book
2017
      ISO27001/ISO27002 : una guía de bolsillo / Alan Calder. HF5548.37 .C35 2017eb   Bestseller
BestsellerE-book
2017
      Risk Assessment for Asset Owners : a Pocket Guide. HF5548.37 .C351 2007eb   Bestseller
BestsellerE-book
2007
Data protection -- Government policy -- United States.    
      Addressing the threat posed by WeChat, and taking additional steps to address the national emergency   E-Gov Document 2020
      Better administration of Automated Targeting System controls can further protect personally identifia   E-Gov Document 2007
      Consumer data privacy in a networked world : a framework for protecting privacy and promoting innovat   E-Gov Document 2012
      Consumer data security and the credit bureaus : hearing before the Committee on Banking, Housing, and KF26 .B39 2017t   E-Gov Document 2018
19 additional entries    
Data protection -- Great Britain. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79023147-781 : Webster, Mandy.     
      Data protection for the HR manager / Mandy Webster. HF5549.2.G7 W43 2003eb   Bestseller
BestsellerE-book
2003
Data protection -- Handbooks, manuals, etc.    
      The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital HD49 .W36 2004 ; Moore Stacks:Available   book
BookPrinted Material
2004
      The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital HD49   Bestseller
BestsellerE-book
2018
      Information security management handbook / edited by Harold F. Tipton, Micki Krause. QA76.9.A25 I54165 2007 ; Moore Stacks:Available   book
BookPrinted Material
2007
Data protection -- International cooperation. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh00006352 : Conference of European Statisticians.     
      Managing statistical confidentiality & microdata access : principles and guidelines of good practice HA34 .C655 2007eb   Bestseller
BestsellerE-book
2007
 

Data protection Law and legislation -- See Also Privacy, Right of


   
Data protection -- Law and legislation.    
      Borders in cyberspace : information policy and the global information infrastructure / edited by Bria K4305.4 .B67 1997eb   Bestseller
BestsellerE-book
1997
      Chokepoints : global private regulation on the Internet / Natasha Tusikov. TK5105.8854 .T877 2017   Bestseller
BestsellerE-book
2017
      Digital Death, Digital Assets and Post-Mortem Privacy [electronic resource]. K3264.C65   Bestseller
BestsellerE-book
2022
      The fundamental right to data protection : normative value in the context of counter-terrorism survei K3264.C65   Bestseller
BestsellerE-book
2017
15 additional entries    
Data protection -- Law and legislation -- Canada. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n79007233-781 : Flaherty, David H.,     
      Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canad K3264.C65 F56 1989   Bestseller
BestsellerE-book
1989
Data protection -- Law and legislation -- Case studies. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/subjects/sh99001484 : Oppenheim, Charles.     
      The no-nonsense guide to legal issues in Web 2.0 and cloud computing / Charles Oppenheim. ZA3075 .O67 2012eb   Bestseller
BestsellerE-book
2012
Data protection -- Law and legislation -- England.    
      Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri KJC1410   Bestseller
BestsellerE-book
2018
      Data profiling and insurance law / Brendan McGurk. KD1859 .M38 2019   Bestseller
BestsellerE-book
2019
      Data protection law for employers : a specially commissioned report / Susan Singleton. KD3097 .S56 2003eb   Bestseller
BestsellerE-book
2003
Data protection -- Law and legislation -- Europe.    
      Privacy in the information age / Fred H. Cate. KF1263.C65 C38 1997 ; Moore Stacks:Available   book
BookPrinted Material
1997
      Protecting privacy in surveillance societies : the Federal Republic of Germany, Sweden, France, Canad K3264.C65 F56 1989   Bestseller
BestsellerE-book
1989
Data protection -- Law and legislation -- European Union countries.    
      Being profiled : cogitas ergo sum : 10 years of 'profiling the European citizen' / Emre Bayamlioğu, I K487.T4 B45 2018eb   Bestseller
BestsellerE-book
2018
      Civil liberties : overview, issues and trends / Stefan Connell, editor. JC596   Bestseller
BestsellerE-book
2018
      Consent in European Data Protection Law. KJE6071 .K676 2013   Bestseller
BestsellerE-book
2013
      Data protection and taxpayers' rights : challenges created by automatic exchange of information / Vik KJE6071 .W64 2018   Bestseller
BestsellerE-book
2018
15 additional entries    
Data protection -- Law and legislation -- Germany.    
      Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri KJC1410   Bestseller
BestsellerE-book
2018
      After the Stasi : collaboration and the struggle for sovereign subjectivity in the writing of German KKA5246 .R56 2015   Bestseller
BestsellerE-book
2015
      Der Grundsatz digitaler Souveränität : eine Untersuchung zur Zulässigkeit des Einbindens privater IT- KK6071.5 .E76 2020eb   Bestseller
BestsellerE-book
2020
      Netzpolitik : Freiheit und Rechtsschutz im Internet / Prof. Dr. Hans Peter Bull. KK164.C66 B85 2013eb   Bestseller
BestsellerE-book
2013
      Privatheit wider Willen? : Verhinderung informationeller Preisgabe im Internet nach deutschem und US- K3264.C65   Bestseller
BestsellerE-book
2015-
Data protection -- Law and legislation -- Great Britain.    
      Cornerstone on Information Law / Damien Welfare. KD3756   Bestseller
BestsellerE-book
2019
      Data protection for the HR manager / Mandy Webster. HF5549.2.G7 W43 2003eb   Bestseller
BestsellerE-book
2003
      Essential law for information professionals / Paul Pedley. KD3756 .P43 2019   Bestseller
BestsellerE-book
2019
      Information law : compliance for librarians, knowledge managers and information professionals / Charl K87   Bestseller
BestsellerE-book
2019
2 additional entries    
Data protection -- Law and legislation -- Netherlands.    
      Access to Personal Data in Public Land Registers : Balancing Publicity of Property Rights with the Ri KJC1410   Bestseller
BestsellerE-book
2018
      The Dutch implementation of the data retention directive : on the storage and use of telephone and in KKM3042 .O35 2014eb   Bestseller
BestsellerE-book
2014
Data protection -- Law and legislation -- North Macedonia. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n2019008836-781     
      Defense : protection of information : agreement between the United States of America and North Macedo   E-Gov Document 2022
Data protection -- Law and legislation -- Slovakia. / https://id.loc.gov/authorities/subjects/sh93000189 https://id.loc.gov/authorities/names/n50075233-781     
      Defense : protection of information : agreement between the United States of America and the Slovak R   E-Gov Document 2022
Data protection -- Law and legislation -- United States.    
      2009 FISMA executive summary report.   E-Gov Document 2010
      American Security Drone Act of 2020 : report of the Committee on Homeland Security and Governmental A KF31 .H65 2020o   E-Gov Document 2020
      American Security Drone Act of 2021 : report of the Committee on Homeland Security and Governmental A   E-Gov Document 2023
      Balancing liberty, privacy, and security with intelligence capabilities : analyses and recommendation KF4850   Bestseller
BestsellerE-book
2014
70 additional entries    
Data protection -- Law and legislation -- United States -- Popular works. / https://id.loc.gov/authorities/subjects/sh2008102020 https://id.loc.gov/authorities/subjects/sh99001720 : Jasper, Margaret C.     
      Privacy and the Internet : your expectations and rights under the law / revised and updated by Margar KF1263.C65 J38 2009 ; Moore Stacks:Available   book
BookPrinted Material
2009
Data protection -- Management. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh2002007911 : Stanton, Jeffrey M.,     
      The visible employee : using workplace monitoring and surveillance to protect information assets--wit HF5549.5.E37 S73 2006eb   Bestseller
BestsellerE-book
2006
Data protection manager.    
      Microsoft System Center Data Protection Manager 2012. QA76.9.D348   Bestseller
BestsellerE-book
2013
      Microsoft System Center Data Protection Manager Cookbook : Maximize Storage Efficiency, Performance, QA76.9.D348   Bestseller
BestsellerE-book
2018
Data protection manager -- Handbooks, manuals, etc. / https://id.loc.gov/authorities/names/n2007075165 https://id.loc.gov/authorities/subjects/sh99001300 : Buchanan, Steve.     
      Microsoft Data Protection Manager 2010 : a practical, step-by-step guide to planning deployment, inst QA76.9.D348 B83 2011eb   Bestseller
BestsellerE-book
2011
Data protection -- Mexico. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n81013960-781     
      El derecho a la información y datos personales en México : una vision comparada con el sistema intera KGF3015   Bestseller
BestsellerE-book
2018
Data protection -- New Zealand. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n79021322-781     
      Indigenous data sovereignty : toward an agenda / edited by Tahu Kukutai and John Taylor. KU519.I64 I527 2016   Bestseller
BestsellerE-book
2016
Data protection -- Security measures. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99005297 : United States.     
      Progress has been made in securing laptops and wireless networks at FEMA / Department of Homeland Sec   E-Gov Document 2012
Data protection -- Security measures -- United States.    
      Audit of NRC's ongoing eligibility for access authorization (OIG-13-A-22) / U.S. Nuclear Regulatory C   E-Gov Document 2013
      DHS can take actions to address its additional cybersecurity responsibilities / Department of Homelan   E-Gov Document 2013
      Transportation Security Administration has taken steps to address the insider threat but challenges r   E-Gov Document 2012
Data protection -- Slovakia. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/names/n50075233-781 : Polčák, Radim,     
      Interception of electronic communications in the Czech Republic and Slovakia / Radim Polčák and other KJP5407.8.C65   Bestseller
BestsellerE-book
2016
Data protection -- Software. / https://id.loc.gov/authorities/subjects/sh85035859 https://id.loc.gov/authorities/subjects/sh99001417 : Hunter, Laura E.     
      Configuring Symantec antivirus / Laura E. Hunter [and others] ; Robert J. Shimonski, technical editor QA76.76.C68 H86 2003eb   Bestseller
BestsellerE-book
2003
Data protection -- Standards.    
      Implementing the ISO/IEC 27001 ISMS standard / Edward Humphreys. QA76.9.A25 H855 2016   Bestseller
BestsellerE-book
2016
      Information security risk management for ISO 27001/ISO 27002 / Alan Calder, Steve G. Watkins. HF5548.37   Bestseller
BestsellerE-book
2019
      An Introduction to Information Security and ISO27001 : 2013. QA76.9.A25 .W845 2013   Bestseller
BestsellerE-book
2013
      ISO 9001 : a pocket guide / Steve Watkins. TS156.6 .W38 2016eb   Bestseller
BestsellerE-book
2016
11 additional entries    
Data protection -- Technological innovations. : Mehan, Julie E.,     
      Artificial intelligence ethical, social and security impacts for the present and the future / Julie M Q334.7   Bestseller
BestsellerE-book
2022
Data protection -- United States.    
      After the breach : the monetization and illicit use of stolen data : hearing before the Subcommittee KF27 .B58 2018   E-Gov Document 2018
      Artificial intelligence and human rights : hearing before the Subcommittee on Human Rights and the La   E-Gov Document 2024
      Assessment of the SEC's privacy program.   E-Gov Document 2010
      Consumer attitudes toward data breach notifications and loss of personal information / Lillian Ablon, HC79.C63 A25 2016   Bestseller
BestsellerE-book
2016
30 additional entries    
Data protection -- United States -- Encyclopedias. / https://id.loc.gov/authorities/subjects/sh2008117500 https://id.loc.gov/authorities/subjects/sh99001614     
      Privacy rights in the digital age / editor, Christopher T. Anglim, JD ; advisory editor, Jane E. Kirt KF1263.C65 P747 2015eb   Bestseller
BestsellerE-book
2016
 

Data reconstruction (Computer science) -- See Data recovery (Computer science)


   
Data recovery (Computer science)    
      Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; J TK5105.885.G66   Bestseller
BestsellerE-book
2011
      Business resumption planning / Edward S. Devlin [and others]. HD49 .B87 2005eb   Bestseller
BestsellerE-book
2005
      Data center virtualization certification, VCP6.5-DCV exam guide : everything you need to achieve 2V0- QA76.9.V5   Bestseller
BestsellerE-book
2018
      Disaster recovery and business continuity : a quick guide for organisations and business managers / T QA76.9.D348   Bestseller
BestsellerE-book
2014
16 additional entries    
Data recovery (Computer science) -- Congresses. / https://id.loc.gov/authorities/subjects/sh88005793 https://id.loc.gov/authorities/subjects/sh99001533 : Johnson, Anne Frances,     
      Recoverability as a first-class security objective : proceedings of a workshop / Anne Frances Johnson QA76.9.D348   Bestseller
BestsellerE-book
2018
Data recovery (Computer science) -- Planning. / https://id.loc.gov/authorities/subjects/sh88005793 https://id.loc.gov/authorities/subjects/sh2002006228     
      Technology disaster response and recovery planning : a LITA guide / edited by Mary Mallery. Z679.7 T43 2015eb   Bestseller
BestsellerE-book
2015
Data recovery (Computer science) -- Planning -- Handbooks, manuals, etc.    
      The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital HD49 .W36 2004 ; Moore Stacks:Available   book
BookPrinted Material
2004
      The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital HD49   Bestseller
BestsellerE-book
2018
Resources
More Information
Result page:  Prev Next