Suggested Topics within your search.
Suggested Topics within your search.
- Data protection 140
- Database security
- Computer security 62
- Security measures 42
- Prevention 36
- Cyberterrorism 21
- Privacy, Right of 21
- Government policy 20
- Security, International 17
- Internet 15
- Data encryption (Computer science) 14
- Database management 12
- Computer crimes 11
- Computer networks 11
- Law and legislation 11
- Access control 9
- Information storage and retrieval systems 8
- Information technology 8
- International cooperation 8
- Computers 7
- Databases 7
- Financial services industry 7
- Online identity theft 7
- Consumer protection 6
- Identity theft 6
- Statistics 6
- Cyberspace 5
- Data processing 5
- Internet of things 5
- Auditing 4
-
1
How to survive a data breach : a pocket guide /
Published 2009Subjects: “…Data protection.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
2
-
3
-
4
The complete book of data anonymization : from planning to implementation /
Published 2013Subjects: “…Data protection.…”
Full Text (via Skillsoft)
Electronic eBook -
5
The complete book of data anonymization : from planning to implementation /
Published 2013Subjects: “…Data protection.…”
Full Text (via O'Reilly/Safari)
Electronic eBook -
6
The complete book of data anonymization : from planning to implementation /
Published 2013Subjects: “…Data protection.…”
Full Text (via Taylor & Francis)
eBook -
7
Deployment guide for Infosphere Guardium /
Published 2014Subjects: Full Text (via O'Reilly/Safari)
eBook -
8
-
9
The complete book of data anonymization from planning to implementation /
Published 2013Subjects: “…Data protection.…”
Online Access (A-Z Journals and Newspapers)
Electronic eBook -
10
E-KLAUSUR UND ELEKTRONISCHE FERNPRUFUNG rechtsfragen der umstellung von... hochschulprufungen auf zeitgemasse, digitale...
Published 2022Subjects: Full Text (via EBSCO)
Electronic eBook -
11
Introduction to information security : LiveLessons (Sneak Peek Video Training) /
Published 2015Subjects: Streaming Video (via O'Reilly/Safari)
Video -
12
Security of data and transaction processing /
Published 2000Subjects: Full Text (via Springer)
eBook -
13
United Nations, cyberspace and international peace and security responding to complexity in the 21st century.
Published 2017Subjects: Full Text (via HeinOnline)
Electronic eBook -
14
ICT's, international security, and cybercrime understanding their intersections for better policymanking /
Published 2021Subjects: Full Text (via HeinOnline)
Electronic eBook -
15
Enterprise architecture and information assurance : developing a secure foundation /
Published 2014Subjects: Full Text (via O'Reilly/Safari)
Electronic eBook -
16
Enterprise architecture and information assurance : developing a secure foundation /
Published 2014Subjects: Full Text (via Skillsoft)
Electronic eBook -
17
Research directions in data and applications security XVIII : IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia,...
Published 2004Subjects: Full Text (via Springer)
Conference Proceeding eBook -
18
Research directions in data and applications security XVIII : IFIP TC11/WG11.3 eighteenth annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia,...
Published 2004Subjects: Full Text (via EBSCO)
Conference Proceeding eBook -
19
UNIDIR Cyber Security Conference 2012 (CS12) the role of CBSs in assuring cyber stability.
Published 2012Subjects: Full Text (via HeinOnline)
Electronic Conference Proceeding eBook -
20
What is the real cost of a breach? /
Published 2020Subjects: Streaming Video (via Alexander Street Press)
Video