Related Books

Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
Language: en
Pages: 224
Authors: Labitzke, Sebastian
Categories: Computers
Type: BOOK - Published: 2013-12-17 - Publisher: KIT Scientific Publishing

DOWNLOAD EBOOK

This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity
Guide to Protecting the Confidentiality of Personally Identifiable Information
Language: en
Pages: 59
Authors: Erika McCallister
Categories: Computers
Type: BOOK - Published: 2010-09 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few yea
Influence of Material and Geometry on the Performance of Superconducting Nanowire Single-Photon Detectors
Language: en
Pages: 0
Authors: Dagmar Henrich
Categories:
Type: BOOK - Published: 2013 - Publisher:

DOWNLOAD EBOOK

This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity
Digital and Social Media Marketing
Language: en
Pages: 337
Authors: Nripendra P. Rana
Categories: Business & Economics
Type: BOOK - Published: 2019-11-11 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book examines issues and implications of digital and social media marketing for emerging markets. These markets necessitate substantial adaptations of deve
Computers at Risk
Language: en
Pages: 320
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 1990-02-01 - Publisher: National Academies Press

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided