Information privacy engineering and privacy by design understanding privacy threats, technology, and regulations based on standards and best practices
| Main Author: | Stallings, William (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boston, Massachusettes
Addison-Wesley
c2020
|
| Subjects: |
Similar Items
Privacy-aware knowledge discovery novel applications and new techniques
by: Bonchi, Francesco, et al.
Published: (2011)
by: Bonchi, Francesco, et al.
Published: (2011)
Introduction to privacy-preserving data publishing : concepts and techniques
by: Fung, Benjamin C. M.
Published: (2011)
by: Fung, Benjamin C. M.
Published: (2011)
Privacy, intrusion detection, and response : technologies for protecting networks
by: Kabiri, Peyman , 1968-
Published: (2012)
by: Kabiri, Peyman , 1968-
Published: (2012)
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008)
by: Acquisti, Alessandro
Published: (2008)
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)
by: Courtney, Kylan
Published: (2014)
Mobile and wireless network security and privacy
by: Makki, S. Kami
Published: (2007)
by: Makki, S. Kami
Published: (2007)
Computer forensics and privacy
by: Caloyannnides, Michael A.
Published: (2001)
by: Caloyannnides, Michael A.
Published: (2001)
Know all about internet privacy
by: Murdock, Keon
Published: (2014)
by: Murdock, Keon
Published: (2014)
Privacy-preserving data mining models and algorithms
by: Aggarwal, Charu C., et al.
Published: (2008)
by: Aggarwal, Charu C., et al.
Published: (2008)
Managing an information security and privacy awareness and training program
by: Herold, Rebecca
Published: (2011)
by: Herold, Rebecca
Published: (2011)
Internet security secrets
by: Vacca, John R.
Published: (1996)
by: Vacca, John R.
Published: (1996)
Hacking exposed 6 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2009)
by: McClure, Stuart, et al.
Published: (2009)
Hacking exposed network security secrets and solutions
by: McClure, Stuart, et al.
Published: (2005)
by: McClure, Stuart, et al.
Published: (2005)
Smart cities cybersecurity and privacy
Internet content regulation contemporary legal and regulatory issues in the changing digital landscape
by: Mahyuddin Daud
Published: (2019)
by: Mahyuddin Daud
Published: (2019)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Information and internet privacy handbook
by: Courtney, Kylan, et al.
Published: (2014)
by: Courtney, Kylan, et al.
Published: (2014)
LAN times guide to security and data integrity
by: Farley, Marc, et al.
Published: (1996)
by: Farley, Marc, et al.
Published: (1996)
Information security governance
by: Solms Von, S. H.
Published: (2009)
by: Solms Von, S. H.
Published: (2009)
CompTIA security + guide to network security fundamentals
by: Ciampa, Mark
by: Ciampa, Mark
Privacy and data protection : a comparative analysis with special reference to the Malaysian proposed law
by: Abu Bakar Munir, et al.
Published: (2002)
by: Abu Bakar Munir, et al.
Published: (2002)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Personal data & privacy protection
by: Abdul Raman Saad
Published: (2005)
by: Abdul Raman Saad
Published: (2005)
Security in fixed and wireless networks
by: Schaefer, Guenter, et al.
Published: (2014)
by: Schaefer, Guenter, et al.
Published: (2014)
CWSP guide to wireless security
by: Ciampa, Mark D.
Published: (2007)
by: Ciampa, Mark D.
Published: (2007)
Computational intelligence for privacy and security
by: Elizondo, David A., et al.
Published: (2012)
by: Elizondo, David A., et al.
Published: (2012)
Mobility, data mining, and privacy geographic knowledge discovery
by: Giannotti, Gianni 1938-, et al.
Published: (2008)
by: Giannotti, Gianni 1938-, et al.
Published: (2008)
Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI
by: Herrmann, Debra S.
Published: (2007)
by: Herrmann, Debra S.
Published: (2007)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Mobile device security : a comprehensive guide to securing your information in a moving world
by: Fried, Stephen , 1962-
Published: (2010)
by: Fried, Stephen , 1962-
Published: (2010)
Network security : the complete reference
by: Bragg, Roberta, et al.
Published: (2004)
by: Bragg, Roberta, et al.
Published: (2004)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Computer security and penetration testing
by: Basta, Alfred, et al.
Published: (2008)
by: Basta, Alfred, et al.
Published: (2008)
Adaptive security management architecture
by: Tiller, James S.
Published: (2011)
by: Tiller, James S.
Published: (2011)
Guide to network defense and countermeasures
by: Holden, Greg
Published: (2003)
by: Holden, Greg
Published: (2003)
Network attacks and defenses a hands-on approach
by: Trabelsi, Zouheir
Published: (2013)
by: Trabelsi, Zouheir
Published: (2013)
Similar Items
-
Privacy-aware knowledge discovery novel applications and new techniques
by: Bonchi, Francesco, et al.
Published: (2011) -
Introduction to privacy-preserving data publishing : concepts and techniques
by: Fung, Benjamin C. M.
Published: (2011) -
Privacy, intrusion detection, and response : technologies for protecting networks
by: Kabiri, Peyman , 1968-
Published: (2012) -
Digital privacy theory, technologies, and practices
by: Acquisti, Alessandro
Published: (2008) -
Information privacy concepts & applications
by: Courtney, Kylan
Published: (2014)