Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in European University Institute Library.
The Resource
Data protection
Resource Information
The concept Data protection represents the subject, aboutness, idea or notion of resources found in European University Institute Library.
- Label
- Data protection
78 Items that share the Concept Data protection
Context
Context of Data protectionSubject of
No resources found
No enriched resources found
- 99 privacy breaches to beware of : practical data protection tips from real-life experiences
- A Practical Guide to TPM 2.0 : Using the Trusted Platform Module in the New Age of Security
- Advanced ASP.NET Core 3 Security : understanding hacks, attacks, and vulnerabilities to secure your website
- Advanced Digital Auditing : Theory and Practice of Auditing Complex Information Systems and Technologies
- Advanced introduction to law and artificial intelligence
- Auditing corporate surveillance systems : research methods for greater transparency
- Beyond data protection : strategic case studies and practical guidance
- Blockchain, Law and Governance
- Building the Infrastructure for Cloud Security : A Solutions View
- Business continuity planning for data centers and systems : a strategic implementation guide
- Cognitive hack : the new battleground in cybersecurity... the human mind
- Creativity comes at a price : the role of collecting societies
- Cryptography and data security
- Cyber Criminology
- Cyber Technological Paradigms and Threat Landscape in India
- Cyber security awareness for CEOs and management
- Cybersecurity
- Cybersecurity law : disciplina italiana ed europea della sicurezza cibernetica anche alla luce delle norme tecniche
- Data Privacy and Trust in Cloud Computing : Building trust in the cloud through assurance and accountability
- Data governance : the definitive guide : people, processes, and tools to operationalize data trustworthiness
- Data governance : value orders and jurisdictional conflicts
- Data governance in AI, fintech and legaltech : law and regulation in the financial sector
- Data privacy : principles and practice
- Data stewardship : an actionable guide to effective data management and data governance
- Digital preservation
- Digital rights management : business and technology
- Earth at Risk in the 21st Century: Rethinking Peace, Environment, Gender, and Human, Water, Health, Food, Energy Security, and Migration : With a Foreword by Lourdes Arizpe Schlosser and a Preface by Hans Günter Brauch
- Energy Resilience and Climate Protection : Energy systems, critical infrastructures, and sustainability goals
- Ethics, law and governance of biobanking : national, European and international approaches
- Facing cyber threats head on : protecting yourself and your business
- Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
- Global privacy protection : the first generation
- Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
- Information Retrieval and Natural Language Processing : A Graph Theory Approach
- Information protection and other unnatural acts : every manager's guide to keeping vital computer data safe and sound
- Intel Trusted Execution Technology for Server Platforms : A Guide to More Secure Datacenters
- Internet and surveillance : the challenges of Web 2.0 and social media
- Law, policy, and technology : cyberterrorism, information warfare, and Internet immobilization
- Libertà vigilata : privacy, sicurezza e mercato nella rete
- Managing Risk and Information Security : Protect to Enable
- Managing Risk and Information Security : Protect to Enable
- Managing and sharing research data : a guide to good practice
- Managing cyber risk in the financial sector : lessons from Asia, Europe and the USA
- Managing information risks : threats, vulnerabilities, and responses
- Measuring and managing information risk : a FAIR approach
- Modern data protection : ensuring recoverability of all modern workloads
- Non-invasive data governance : the path of least resistance and greatest success
- Nuclear Power Plants: Innovative Technologies for Instrumentation and Control Systems : The Sixth International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant (ISNPP)
- Of Privacy and power : the Transatlantic struggle over Freedom and Security
- Open banking
- Platform Embedded Security Technology Revealed : Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
- Privacy is hard and seven other myths : achieving privacy through careful design
- Privacy vs. security
- Privacy, openness and trust
- Reinforcement Learning with Hybrid Quantum Approximation in the NISQ Context
- Risk centric threat modeling : process for attack simulation and threat analysis
- Security in Computer and Information Sciences : First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers
- Security/Mobility : politics of movement
- Smart TV and data protection
- Social Network Analysis and Law Enforcement : Applications for Intelligence Analysis
- Surveillance after Snowden
- Surveillance studies : an overview
- Surveillance, power and modernity : bureaucracy and discipline from 1700 to the present day
- Technocreep : the surrender of privacy and the capitalization of intimacy
- The Future of Financial Systems in the Digital Age : Perspectives from Europe and Japan
- The InfoSec Handbook : An Introduction to Information Security
- The Palgrave Handbook of International Cybercrime and Cyberdeviance
- The Palgrave Handbook of International Cybercrime and Cyberdeviance
- The Privacy Engineer's Manifesto : Getting from Policy to Code to QA to Value
- The Right to Data Protection : Individual and Structural Dimensions of Data Protection in EU Law
- The chief data officer's playbook
- The economics of cybersecurity
- The future of identity in the information society : challenges and opportunities
- The patient, data protection and changing healthcare models : the iImpact of e-health on informed consent, anonymisation and purpose limitation
- The role of Internet access in enabling individual's rights and freedoms
- The security risk assessment handbook : a complete guide for performing security risk assessments
- Unauthorized Access : The Crisis in Online Privacy and Security
- Understanding cyber risk : protecting your corporate assets
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/cNuXtZ-TWhg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/cNuXtZ-TWhg/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Data protection
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.eui.eu/resource/cNuXtZ-TWhg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.eui.eu/resource/cNuXtZ-TWhg/">Data protection</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.eui.eu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.library.eui.eu/">European University Institute Library</a></span></span></span></span></div>