Zoekresultaten
Resultaat 81 - 100 (van 280)
J.C.H. Aalders | I.S. Herschberg | A. van Zanten Handbook for information security
a guide towards information security standards
Non-fictie
Engels | 761 pagina's | North-Holland, Amsterdam, New York | 1985
Gedrukt boek
IT convergence and security 2012
Non-fictie
Engels | 1242 pagina's | Springer, Dordrecht [etc.] | 2013
Gedrukt boek
Information technology convergence, secure and trust computing, and data management
ITCS 2012 & STA 2012
Non-fictie
Engels | 294 pagina's | Springer, Dordrecht [etc.] | 2012
Gedrukt boek
Manon Oostveen Protecting individuals against the negative impact of big data
potential and limitations of the privacy and data protection law approach
Non-fictie
Engels | 244 pagina's | Wolters Kluwer, Alphen aan den Rijn | 2018
Gedrukt boek
W. van der Wagen From cybercrime to cyborg crime
an exploration of high-tech cybercrime, offenders and victims through the lens of Actor-Network Theory
Non-fictie
Engels | 300 pagina's | Rijksuniversiteit Groningen, [Groningen] | 2018
Gedrukt boek
Derrick Rountree Security for Microsoft Windows System administrators
introduction to key information security concepts
Non-fictie
Engels | 198 pagina's | Syngress, Amsterdam [etc.] | 2011
Gedrukt boek
Computers, privacy and data protection: an element of choice
Non-fictie
Engels | 457 pagina's | Springer, Dordrecht [etc.] | 2011
Gedrukt boek
E.M.L. Moerel Binding corporate rules
fixing the regulatory patchwork of data protection
Non-fictie
Engels | 599 pagina's | 2011
Gedrukt boek
Y. Bobbert Maturing business information security
a framework to establish the desired state of security maturity
Non-fictie
Engels | 255 pagina's | Bobbert], [Veenendaal | 2010
Gedrukt boek
Alberto Partida | Diego Andina IT security management
IT securiteers - setting up an IT security function
Non-fictie
Engels | 247 pagina's | Springer, Dordrecht [etc.] | 2010
Gedrukt boek
Data protection in a profiled world
Non-fictie
Engels | 334 pagina's | Springer, Dordrecht [etc.] | 2010
Gedrukt boek
Peter Wayner Disappearing cryptography
information hiding: steganography & watermarking
Non-fictie
Engels | 439 pagina's | Morgan Kaufmann, Amsterdam [etc.] | 2009
Gedrukt boek
Alan Calder Implementing information security based on ISO 27001/ISO 27002
a management guide
Non-fictie
Engels | 75 pagina's | Van Haren Publishing, Zaltbommel | 2009
Gedrukt boek
Alan Calder Information security based on ISO 27001/ISO 27002
a management guide
Non-fictie
Engels | 85 pagina's | Van Haren Publishing, Zaltbommel | 2009
Gedrukt boek
Sven Zdenjek Kiljan Exploring, expanding and evaluating usable security in online banking
Non-fictie
Engels | 189 pagina's | Open Universiteit, Heerlen | 2017
Gedrukt boek
NATO Public Diplomacy Division Verification of infinite-state systems with applications to security
Non-fictie
Engels | 235 pagina's | IOS Press, Amsterdam [etc.] | 2006
Gedrukt boek
L.F. Pau Privacy management service contracts as a new business opportunity for operators
Non-fictie
Engels | 10 pagina's | Erasmus Research Institute of Management (ERIM), Rotterdam | 2006
Gedrukt boek
R. Corin Analysis models for security protocols
Non-fictie
Engels | 168 pagina's | 2006
Gedrukt boek
Lodewijk Asscher | Sjo Anne Hoogcarspel Regulating spam
a European perspective after the adoption of the E-Privacy Directive
Non-fictie
Engels | 153 pagina's | T.M.C. Asser Press, The Hague | 2006
Gedrukt boek
V.N.L. Franqueira | P. van Eck Towards alignment of architectural domains in security policy specifications
Non-fictie
Engels | Centre for Telematics and Information Technology, University of Twente, Enschede | 2006
Gedrukt boek