Tomeki

Explore Books on
data protection

1-24 of 4,833 Books

View Sozialgesetzbuch By Germany
Cover of Sozialgesetzbuch by germany

Sozialgesetzbuch

By Germany

View Hacking for Dummies By Kevin Beaver,Jutta Schmidt
Cover of Hacking for Dummies by kevin beaver,jutta schmidt

Hacking for Dummies

By Kevin Beaver,Jutta Schmidt

View SAS(R) 9.1.3 Intelligence Platform By SAS Publishing
Cover of SAS(R) 9.1.3 Intelligence Platform by sas publishing

SAS(R) 9.1.3 Intelligence Platform

By SAS Publishing

View Information security By United States. General Accounting Office

Information security

Information security

By United States. General Accounting Office

View e-Business and Telecommunications By Mohammad S. Obaidat,Joaquim Filipe
Cover of e-Business and Telecommunications by mohammad s. obaidat,joaquim filipe

e-Business and Telecommunications

By Mohammad S. Obaidat,Joaquim Filipe

View Optimal Spending on Cybersecurity Measures By Tara Kissoon
Cover of Optimal Spending on Cybersecurity Measures by tara kissoon

Optimal Spending on Cybersecurity Measures

By Tara Kissoon

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View Security without Obscurity By Jeff Stapleton
Cover of Security without Obscurity by jeff stapleton

Security without Obscurity

By Jeff Stapleton

View Security in Computing and Communications By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero
Cover of Security in Computing and Communications by sabu m. thampi,sanjay madria,guojun wang,danda b. rawat,jose m. alcaraz calero

Security in Computing and Communications

By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero

View Network Security Assessment By Chris McNab
Cover of Network Security Assessment by chris mcnab

Network Security Assessment

By Chris McNab

View Intelligence and Security Informatics By Michael Chau
Cover of Intelligence and Security Informatics by michael chau

Intelligence and Security Informatics

By Michael Chau

View Cybersecurity Law By Jeff Kosseff
Cover of Cybersecurity Law by jeff kosseff

Cybersecurity Law

By Jeff Kosseff

View Information Security and Cryptology By Dongdai Lin,Shouhuai Xu,Moti Yung
Cover of Information Security and Cryptology by dongdai lin,shouhuai xu,moti yung

Information Security and Cryptology

By Dongdai Lin,Shouhuai Xu,Moti Yung

View Modeling Decisions for Artificial Intelligence By Vicenç Torra
Cover of Modeling Decisions for Artificial Intelligence by vicenç torra

Modeling Decisions for Artificial Intelligence

By Vicenç Torra

View Information security and cryptology By Helger Lipmaa,Moti Yung,Donghai Lin
Cover of Information security and cryptology by helger lipmaa,moti yung,donghai lin

Information security and cryptology

By Helger Lipmaa,Moti Yung,Donghai Lin

View Einführung in das Datenschutzrecht By Marie-Theres Tinnefeld
Cover of Einführung in das Datenschutzrecht by marie-theres tinnefeld

Einführung in das Datenschutzrecht

By Marie-Theres Tinnefeld

View Data Protection By Preston de Guise

Data Protection

Data Protection

By Preston de Guise

View Digital Forensics and Watermarking By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu
Cover of Digital Forensics and Watermarking by yun qing shi,hyoung joong kim,fernando perez-gonzalez,feng liu

Digital Forensics and Watermarking

By Yun Qing Shi,Hyoung Joong Kim,Fernando Perez-Gonzalez,Feng Liu

View Cloud Computing Security By John R. Vacca
Cover of Cloud Computing Security by john r. vacca

Cloud Computing Security

By John R. Vacca

View Information warfare By Daniel Ventre

Information warfare

Information warfare

By Daniel Ventre

View Future Data and Security Engineering By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai
Cover of Future Data and Security Engineering by tran khanh dang,roland wagner,erich j. neuhold,makoto takizawa,josef küng,nam thoai

Future Data and Security Engineering

By Tran Khanh Dang,Roland Wagner,Erich J. Neuhold,Makoto Takizawa,Josef Küng,Nam Thoai

View IT Governance By Alan Calder,Steve Watkins
Cover of IT Governance by alan calder,steve watkins

IT Governance

By Alan Calder,Steve Watkins

View Determann's field guide to data privacy law By Lothar Determann
Cover of Determann's field guide to data privacy law by lothar determann

Determann's field guide to data privacy law

By Lothar Determann