Âîñïîëüçóéòåñü ôîðìîé ïîèñêà ïî ñàéòó, ÷òîáû ïîäîáðàòü ïîëíûé ñïèñîê èñïîëüçîâàííîé ëèòåðàòóðû.
Åñëè âû õîòèòå âûáðàòü äëÿ ñïèñêà ëèòåðàòóðû êíèãè îïðåäåëåííîãî ãîäà èçäàíèÿ, äîñòàòî÷íî äîïèñàòü åãî ê ïîèñêîâîìó çàïðîñó.
Ðåçóëüòàòû ïîèñêà
Ëó÷øèå ðåçóëüòàòû- Guosong Shao. Internet Law in China (Chandos Asian Studies). – Ì.: , 2012. – 316 ñ.
- Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 445 ñ.
- Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – Ì.: , 2012. – 464 ñ.
- Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 334 ñ.
- Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – Ì.: , 2012. – 468 ñ.
- Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – Ì.: , 2012. – 298 ñ.
- Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – Ì.: , 2012. – 195 ñ.
- Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 219 ñ.
- Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 283 ñ.
- Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 289 ñ.
- Orlan Lee. Waiving Our Rights: The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties. – Ì.: , 2012. – 306 ñ.
- Jack J. Champlain. Auditing Information Systems. – Ì.: , 0. – 0 ñ.
- Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – Ì.: , 0. – 0 ñ.
- Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – Ì.: , 0. – 0 ñ.
- Andrew Frackman, Claudia Ray, Rebecca Martin. Internet and Online Privacy: A Legal and Business Guide. – Ì.: , 0. – 0 ñ.
- Richard A. Posner, Francesco Parisi. The Economics of Private Law: The Collected Economic Essays of Richard A. Posner (Economists of the Twentieth Century Series). – Ì.: , 0. – 0 ñ.
- Frederick S. Lane. Naked Employee, The: How Technology Is Compromising Workplace Privacy. – Ì.: AMACOM/American Management Association, 2003. – 304 ñ.
- Erin J. Kelly. From The Trenches: Strategies from Industry Leaders on the New Economy. – Ì.: , 0. – 0 ñ.
- Sara Baase. A Gift of Fire. – Ì.: , 0. – 0 ñ.
- Joan Callahan. Ethical Issues in Professional Life. – Ì.: , 0. – 0 ñ.
- Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – Ì.: , 0. – 0 ñ.
- Bernd Stahl. Responsible Management of Information Systems. – Ì.: , 0. – 0 ñ.
- Elizabeth A. Buchanan. Readings in Virtual Research Ethics: Issues and Controversies. – Ì.: , 0. – 0 ñ.
- Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – Ì.: , 0. – 0 ñ.
- Lisa H. Cassilly, Clare Draper. Privacy in the Workplace: A Guide for Attorneys and HR Professionals. – Ì.: , 0. – 0 ñ.
- Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – Ì.: , 0. – 0 ñ.
- Fred H. Cate, Robert E. Litan, Michael Staten, Peter J. Wallison. Financial Privacy, Consumer Prosperity, and the Public Good. – Ì.: , 0. – 0 ñ.
- Peter P. Swire, Robert E. Litan. None of Your Business: World Data Flows, Electronic Commerce, & the European Privacy Directive. – Ì.: , 0. – 0 ñ.
- Xun Lu, Guangping Xu, Bonnie S. McDougall. Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping (Studies on Contemporary China). – Ì.: , 0. – 0 ñ.
- Benjamin, Iii, Dr. Robinson. Financial Privacy & Electronic Commerce: Who's in My Business. – Ì.: , 0. – 0 ñ.
- Adam Starchild. Using Offshore Havens for Privacy & Profit: Revised and Updated Edition. – Ì.: , 0. – 0 ñ.
- Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – Ì.: , 0. – 0 ñ.
- Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – Ì.: , 0. – 0 ñ.
- Stephen Cobb. Privacy for Business: Web Sites and Email. – Ì.: , 0. – 0 ñ.
- Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – Ì.: , 0. – 0 ñ.
- Anup K. Ghosh. E-Commerce Security and Privacy. – Ì.: , 0. – 0 ñ.
- Information Ethics: Privacy and Intellectual Property. – Ì.: , 2004. – 0 ñ.
- Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – Ì.: , 2005. – 0 ñ.
- Jody R. Westby. International Guide to Privacy. – Ì.: , 2005. – 247 ñ.
- Sjaak Nouwt, Berend R. de Vries, Corien Prins. Reasonable Expectations of Privacy?: Eleven country reports on camera surveillance and workplace privacy (Information Technology and Law). – Ì.: Asser Press, 2005. – 382 ñ.
- Mari J. Frank. Safeguard Your Identity: Protect Yourself With A Personal Privacy Audit. – Ì.: , 2005. – 232 ñ.
- Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – Ì.: , 2006. – 272 ñ.
- Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – Ì.: , 2008. – 514 ñ.
- Joseph Campana. Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty. – Ì.: , 2008. – 320 ñ.
- Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – Ì.: , 2008. – 205 ñ.
- Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – Ì.: , 2009. – 414 ñ.
- J.C. Cannon. Privacy: What Developers and IT Professionals Should Know. – Ì.: , 2009. – 384 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption. – Ì.: , 1998. – 352 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption (Paper). – Ì.: , 1999. – 352 ñ.
- Philip Agre. Technology & Privacy – The New Landscape. – Ì.: , 1997. – 332 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping and Encryption, Updated and Expanded Edition. – Ì.: , 2010. – 496 ñ.
- Philip Agre. Technology & Privacy – The New Landscape (Paper). – Ì.: , 1998. – 332 ñ.
- Lorrie Faith Cranor. Web Privacy with P3P. – Ì.: , 2002. – 344 ñ.
- Mark Monmonier. Spying with Maps – Surveillance Technologies & the Future of Privacy. – Ì.: , 2002. – 264 ñ.
- Mark Monmonier. Spying with Maps – Surveillance Technologies and the Future of Privacy. – Ì.: , 2004. – 240 ñ.
- Charles Fried. Because it is Wrong – Torture, Privacy and Presidential Power in the Age of Terror. – Ì.: , 2010. – 192 ñ.
- Saul Levmore. The Offensive Internet – Speech, Privacy, and Reputation. – Ì.: , 2010. – 296 ñ.
- Jill Callahan Dennis. Privacy and Confidentiality of Health Information. – Ì.: , 2000. – 128 ñ.
- KH Decker. Employee Privacy Forms & Procedures 1992 Cumulative Supp. – Ì.: , 1991. – 112 ñ.
- L Gostin. Surrogate Motherhood – Politics & Privacy. – Ì.: , 1990. – 384 ñ.
- John Sileo. Privacy Means Profit. – Ì.: , 2010. – 246 ñ.
- K Decker. Employee Privacy Law & Practice 1997 Supplement. – Ì.: , 1997. – 114 ñ.
- Paul Shaw. E–Business Privacy and Trust. – Ì.: , 2001. – 240 ñ.
- KH DECKER. Decker: Employee Privacy Forms & Procedures. – Ì.: , 1988. – 498 ñ.
- Tim Mather. Cloud Security and Privacy. – Ì.: , 2009. – 334 ñ.
- David H. Holtzman. Privacy Lost. – Ì.: , 2006. – 352 ñ.
- Wolfgang Sofsky. Privacy – A Manifesto. – Ì.: , 2008. – 160 ñ.
- Bryan Pfaffenberger. Protect Your Privacy on the Internet. – Ì.: , 1997. – 336 ñ.
- Colin Bennett. The Governance of Privacy – Policy Instruments in Global Perspective. – Ì.: , 2006. – 368 ñ.
- Michael Miller. Absolute PC Security and Privacy. – Ì.: , 2002. – 560 ñ.
- Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
- Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
- Daniel J Solove. Understanding Privacy. – Ì.: , 2009. – 272 ñ.
- Simson Garfinkel. Web Security, Privacy & Commerce 2e. – Ì.: , 2001. – 790 ñ.
- Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
- Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
- Patricia Meyer Spacks. Privacy – Concealing the Eighteenth–Century Self. – Ì.: , 2003. – 248 ñ.
- Simson Garfinkel. Database Nation – The Death of Privacy in the 21st Century. – Ì.: , 2001. – 320 ñ.
- Bruce Schneier. The Electronic Privacy Papers. – Ì.: , 1997. – 748 ñ.
- Kurt H. Decker. A Manager?s Guide to Employee Privacy. – Ì.: , 1989. – 288 ñ.
- Edited by Madeleine Colvin. Developing Key Privacy Rights. – Ì.: , 2011. – 208 ñ.
- John D. R. Craig. Privacy and Employment Law. – Ì.: , 2011. – 320 ñ.
- David Sherborne, Mark Thomson and Hugh Tomlinson QC. The Law of Personal Privacy. – Ì.: , 2011. – 176 ñ.
- D J Solove. The Future Of Reputation – Gossip, Rumour, and Privacy on the Internet. – Ì.: , 2008. – 256 ñ.
- K DECKER. Decker: Employee Privacy Law & Practice 1994 Cumulative Supplement (pr Only). – Ì.: , 1994. – 358 ñ.
- Amy L Fairchild. Searching Eyes – Privacy, the State and Disease Surveillance in America. – Ì.: , 2007. – 372 ñ.
- Stefan Brands. Rethinking Public Key Infrastructures & Digital Certificates – Building in Privacy. – Ì.: , 2000. – 340 ñ.
- Carl D Schneider. Shame, Exposure & Privacy. – Ì.: , 1992. – 202 ñ.
- Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media (Paper). – Ì.: , 1996. – 402 ñ.
- Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media. – Ì.: , 1994. – 402 ñ.
- Hitesh Chhinkaniwala and Sanjay Garg. Privacy Preserving Data Mining - Issues & Techniques. – Ì.: Scholars Press, 2014. – 120 ñ.
- Abdul-Razak Suleman. Loyalty Scheme Enrolment And Privacy Issues. – Ì.: LAP Lambert Academic Publishing, 2012. – 236 ñ.
- Suhel Sayyad and Prakash Kulkarni. Privacy Preserving Back Propagation Algorithm. – Ì.: LAP Lambert Academic Publishing, 2012. – 56 ñ.
- Alex Boniface Makulilo. Privacy and Data Protection in Africa. – Ì.: Scholars' Press, 2014. – 572 ñ.
- Akram M. Almatarneh. The Right to Privacy and Data Protection in the Information Age:. – Ì.: LAP Lambert Academic Publishing, 2015. – 524 ñ.
- Cesare Bartolini. Privacy in the information society and the principle of necessity. – Ì.: LAP Lambert Academic Publishing, 2013. – 108 ñ.
- Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – Ì.: LAP Lambert Academic Publishing, 2013. – 76 ñ.
- Nadejda Mironov. Public Video Surveillance: ratio of privacy and security in the UK. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
- Faustin Muyembe. Is Privacy Protection Enough?. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
- Alebachew B. Enyew. The Legal Regime on Privacy and Personal Information Protection. – Ì.: LAP Lambert Academic Publishing, 2010. – 68 ñ.
- Dr Hurriyah El Islamy. Privacy as Freedom of Private Life. – Ì.: LAP Lambert Academic Publishing, 2010. – 360 ñ.
- Evert Mouw. Health Privacy and Political Attitudes. – Ì.: LAP Lambert Academic Publishing, 2010. – 72 ñ.
- Àëñó Õóñàåíîâà. Êëàñòåðíûé êîíöåïò PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2011. – 204 ñ.
- Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – Ì.: LAP Lambert Academic Publishing, 2013. – 204 ñ.
- Wiem Tounsi. Security and Privacy Controls in RFID Systems. – Ì.: LAP Lambert Academic Publishing, 2014. – 172 ñ.
- Shampa Bhattacharyya and Amit Bhattacharyya. Privacy Preserving Data Mining. – Ì.: LAP Lambert Academic Publishing, 2015. – 100 ñ.
- Sanaz Kavianpour and Zuraini Ismail. Preserving Privacy in Social Network Sites using Anonymity Algorithm. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
- Arik Friedman,Ran Wolff and Assaf Schuster. Embedding Privacy in Data Mining. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
- Adeel Anjum. Towards Privacy Preserving Publication of Continuous and Dynamic Data. – Ì.: Scholars' Press, 2013. – 152 ñ.
- Ozlem Ozkan,Osman Saka and Ali Arifoglu. Attitudes Of People Who Use Medical Services About Privacy Of EHR. – Ì.: LAP Lambert Academic Publishing, 2011. – 100 ñ.
- Ali Dehghantanha. Formal Methods for Analyzing Privacy Policies. – Ì.: LAP Lambert Academic Publishing, 2011. – 300 ñ.
- Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 68 ñ.
- Anour F.A. Dafa-Alla. Incorporating Background Knowledge in Privacy Preserving Geolocation. – Ì.: LAP Lambert Academic Publishing, 2012. – 140 ñ.
- Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
- Ibrahim Yakut and Huseyin Polat. DIMENSIONALITY REDUCTION-BASED RECOMMENDATIONS WITH PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2010. – 80 ñ.
- Sridhar Mandapati. Privacy Preserving Data Mining using Optimization Methods. – Ì.: LAP Lambert Academic Publishing, 2014. – 128 ñ.
- Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – Ì.: LAP Lambert Academic Publishing, 2015. – 156 ñ.
- Ali Dehghantanha. Privacy in Pervasive Computing Systems. – Ì.: LAP Lambert Academic Publishing, 2010. – 136 ñ.
- Flavio Bertini. Data privacy in Desktop as a Service. – Ì.: LAP Lambert Academic Publishing, 2014. – 76 ñ.
- Paolo Gasti. Privacy and Security of Internet Communications. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
- Jose M. Such,Ana Garcia-Fornes and Agustin Espinosa. Enhancing Privacy in Multi-agent Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 208 ñ.
- Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – Ì.: LAP Lambert Academic Publishing, 2013. – 216 ñ.
- Yunia Miyayo and Abraham Idowu. Privacy. – Ì.: LAP Lambert Academic Publishing, 2015. – 108 ñ.
Äîïîëíèòåëüíûå ðåçóëüòàòû- Guosong Shao. Internet Law in China (Chandos Asian Studies). – Ì.: , 2012. – 316 ñ.
- Principles of Security and Trust: First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 445 ñ.
- Janet Portman Attorney, Marcia Stewart. Every Tenant's Legal Guide. – Ì.: , 2012. – 464 ñ.
- Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 334 ñ.
- Wireless Communications and Applications: First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers (Lecture ... and Telecommunications Engineering). – Ì.: , 2012. – 468 ñ.
- Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012, Proceedings (IFIP Advances in Information and Communication Technology). – Ì.: , 2012. – 298 ñ.
- Security and Privacy in Mobile Information and Communication Systems: Third International ICST Conference, MOBISEC 2011, Aalborg, Denmark, May 17-19, ... and Telecommunications Engineering). – Ì.: , 2012. – 195 ñ.
- Public Key Infrastructures, Services and Applications: 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 219 ñ.
- Identity and Privacy in the Internet Age: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 283 ñ.
- Formal Aspects of Security and Trust: 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers (Lecture ... Computer Science / Security and Cryptology). – Ì.: , 2012. – 289 ñ.
- Orlan Lee. Waiving Our Rights: The Personal Data Collection Complex and Its Threat to Privacy and Civil Liberties. – Ì.: , 2012. – 306 ñ.
- Jack J. Champlain. Auditing Information Systems. – Ì.: , 0. – 0 ñ.
- Paul Shaw. E-Business Privacy and Trust: Planning and Management Strategies. – Ì.: , 0. – 0 ñ.
- Constance S. Hawke, Constance S. Hawke. Computer and Internet Use on Campus: A Legal Guide to Issues of Intellectual Property, Free Speech, and Privacy. – Ì.: , 0. – 0 ñ.
- Andrew Frackman, Claudia Ray, Rebecca Martin. Internet and Online Privacy: A Legal and Business Guide. – Ì.: , 0. – 0 ñ.
- Richard A. Posner, Francesco Parisi. The Economics of Private Law: The Collected Economic Essays of Richard A. Posner (Economists of the Twentieth Century Series). – Ì.: , 0. – 0 ñ.
- Frederick S. Lane. Naked Employee, The: How Technology Is Compromising Workplace Privacy. – Ì.: AMACOM/American Management Association, 2003. – 304 ñ.
- Erin J. Kelly. From The Trenches: Strategies from Industry Leaders on the New Economy. – Ì.: , 0. – 0 ñ.
- Sara Baase. A Gift of Fire. – Ì.: , 0. – 0 ñ.
- Joan Callahan. Ethical Issues in Professional Life. – Ì.: , 0. – 0 ñ.
- Terrell Ward Bynum, Simon Rogerson, Blackwell Pub. Computer Ethics and Professional Responsibility: Introductory Text and Readings. – Ì.: , 0. – 0 ñ.
- Bernd Stahl. Responsible Management of Information Systems. – Ì.: , 0. – 0 ñ.
- Elizabeth A. Buchanan. Readings in Virtual Research Ethics: Issues and Controversies. – Ì.: , 0. – 0 ñ.
- Larry Gross, John Stuart Katz, Jay Ruby. Image Ethics: The Moral Rights of Subjects in Photographs, Film, and Television (Communication and Society). – Ì.: , 0. – 0 ñ.
- Joseph Migga Kizza, Joseph Kizza. Ethical and Social Issues in the Information Age. – Ì.: , 0. – 0 ñ.
- Tom Forester, Perry Morrison. Computer Ethics, Second Edition: Cautionary Tales and Ethical Dilemmas in Computing. – Ì.: , 0. – 0 ñ.
- Virginia Haufler. A Public Role for the Private Sector : Industry Self-Regulation in a Global Economy. – Ì.: , 0. – 0 ñ.
- Thomas D. Schneid. Occupational Health Guide to Violence in the Workplace. – Ì.: , 0. – 0 ñ.
- Lisa H. Cassilly, Clare Draper. Privacy in the Workplace: A Guide for Attorneys and HR Professionals. – Ì.: , 0. – 0 ñ.
- Littler Mendelson Attorneys, Shanti Atkins, Garen Dodge, Ronald Manthey, Marlene Muraco. Beyond Big Brother: The New World of Workplace Privacy. – Ì.: , 0. – 0 ñ.
- Stella Ting-Toomey. Communicating Across Cultures. – Ì.: , 0. – 0 ñ.
- Donald Dickson. Confidentiality and Privacy in Social Work: A Guide to the Law for Practitioners and Students. – Ì.: , 0. – 0 ñ.
- Albert J. Marcella, Carol Stucki. Privacy Handbook : Guidelines, Exposures, Policy Implementation, and International Issues. – Ì.: , 0. – 0 ñ.
- Phil Lowe. McGraw-Hill One-Day Workshop: Empowering Individuals. – Ì.: , 0. – 0 ñ.
- Ron Schneiderman. The Mobile Technology Question and Answer Book: A Survival Guide for Business Managers. – Ì.: , 0. – 0 ñ.
- Fred H. Cate, Robert E. Litan, Michael Staten, Peter J. Wallison. Financial Privacy, Consumer Prosperity, and the Public Good. – Ì.: , 0. – 0 ñ.
- Peter P. Swire, Robert E. Litan. None of Your Business: World Data Flows, Electronic Commerce, & the European Privacy Directive. – Ì.: , 0. – 0 ñ.
- Xun Lu, Guangping Xu, Bonnie S. McDougall. Love-Letters and Privacy in Modern China: The Intimate Lives of Lu Xun and Xu Guangping (Studies on Contemporary China). – Ì.: , 0. – 0 ñ.
- Thom Hartmann. Unequal Protection: The Rise of Corporate Dominance and the Theft of Human Rights. – Ì.: , 0. – 0 ñ.
- Paul S. Turner, Diane B. Wunnicke. Managing the Risks of Payments Systems. – Ì.: , 0. – 0 ñ.
- Benjamin, Iii, Dr. Robinson. Financial Privacy & Electronic Commerce: Who's in My Business. – Ì.: , 0. – 0 ñ.
- Adam Starchild. Using Offshore Havens for Privacy & Profit: Revised and Updated Edition. – Ì.: , 0. – 0 ñ.
- Adam Starchild. The Offshore Privacy Manual. – Ì.: , 0. – 0 ñ.
- L. Jean Camp. Trust and Risk in Internet Commerce. – Ì.: , 0. – 0 ñ.
- J. De Gross. Information Technology and Changes in Organizational Work. – Ì.: , 0. – 0 ñ.
- Richard Hunter. World Without Secrets: Business, Crime and Privacy in the Age of Ubiquitous Computing. – Ì.: , 0. – 0 ñ.
- Rebecca Herold. The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions. – Ì.: , 0. – 0 ñ.
- Manuel Castells. The Internet Galaxy: Reflections on the Internet, Business, and Society. – Ì.: Oxford University Press, 2003. – 304 ñ.
- Charles Jennings, Elizabeth Dyson, Lori Fena. The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet. – Ì.: , 0. – 0 ñ.
- Socially Responsible IT Management. – Ì.: , 0. – 0 ñ.
- Stephen Cobb. Privacy for Business: Web Sites and Email. – Ì.: , 0. – 0 ñ.
- Robert B. Gelman, Gelman, Stanton McCandlish, Electronic Frontier Foundation. Protecting Yourself Online: The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace. – Ì.: , 0. – 0 ñ.
- Anup K. Ghosh. E-Commerce Security and Privacy. – Ì.: , 0. – 0 ñ.
- Information Ethics: Privacy and Intellectual Property. – Ì.: , 2004. – 0 ñ.
- Rebecca Herold. Managing an Information Security and Privacy Awareness and Training Program. – Ì.: , 2005. – 0 ñ.
- Jody R. Westby. International Guide to Privacy. – Ì.: , 2005. – 247 ñ.
- Sjaak Nouwt, Berend R. de Vries, Corien Prins. Reasonable Expectations of Privacy?: Eleven country reports on camera surveillance and workplace privacy (Information Technology and Law). – Ì.: Asser Press, 2005. – 382 ñ.
- Mari J. Frank. Safeguard Your Identity: Protect Yourself With A Personal Privacy Audit. – Ì.: , 2005. – 232 ñ.
- Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust. – Ì.: , 2006. – 272 ñ.
- Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems). – Ì.: , 2008. – 514 ñ.
- Joseph Campana. Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty. – Ì.: , 2008. – 320 ñ.
- Trust, Privacy and Security in Digital Business: 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings (Lecture Notes in Computer Science). – Ì.: , 2008. – 205 ñ.
- Hamid R. Nemati. Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues (Advances in Information Security and Privacy). – Ì.: , 2009. – 414 ñ.
- J.C. Cannon. Privacy: What Developers and IT Professionals Should Know. – Ì.: , 2009. – 384 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption. – Ì.: , 1998. – 352 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping & Encryption (Paper). – Ì.: , 1999. – 352 ñ.
- Philip Agre. Technology & Privacy – The New Landscape. – Ì.: , 1997. – 332 ñ.
- Whitfield Diffie. Privacy on the Line – The Politics of Wiretapping and Encryption, Updated and Expanded Edition. – Ì.: , 2010. – 496 ñ.
- Philip Agre. Technology & Privacy – The New Landscape (Paper). – Ì.: , 1998. – 332 ñ.
- Lorrie Faith Cranor. Web Privacy with P3P. – Ì.: , 2002. – 344 ñ.
- Mark Monmonier. Spying with Maps – Surveillance Technologies & the Future of Privacy. – Ì.: , 2002. – 264 ñ.
- Mark Monmonier. Spying with Maps – Surveillance Technologies and the Future of Privacy. – Ì.: , 2004. – 240 ñ.
- Charles Fried. Because it is Wrong – Torture, Privacy and Presidential Power in the Age of Terror. – Ì.: , 2010. – 192 ñ.
- Saul Levmore. The Offensive Internet – Speech, Privacy, and Reputation. – Ì.: , 2010. – 296 ñ.
- Jill Callahan Dennis. Privacy and Confidentiality of Health Information. – Ì.: , 2000. – 128 ñ.
- KH Decker. Employee Privacy Forms & Procedures 1992 Cumulative Supp. – Ì.: , 1991. – 112 ñ.
- L Gostin. Surrogate Motherhood – Politics & Privacy. – Ì.: , 1990. – 384 ñ.
- John Sileo. Privacy Means Profit. – Ì.: , 2010. – 246 ñ.
- K Decker. Employee Privacy Law & Practice 1997 Supplement. – Ì.: , 1997. – 114 ñ.
- Paul Shaw. E–Business Privacy and Trust. – Ì.: , 2001. – 240 ñ.
- KH DECKER. Decker: Employee Privacy Forms & Procedures. – Ì.: , 1988. – 498 ñ.
- Tim Mather. Cloud Security and Privacy. – Ì.: , 2009. – 334 ñ.
- David H. Holtzman. Privacy Lost. – Ì.: , 2006. – 352 ñ.
- Wolfgang Sofsky. Privacy – A Manifesto. – Ì.: , 2008. – 160 ñ.
- Bryan Pfaffenberger. Protect Your Privacy on the Internet. – Ì.: , 1997. – 336 ñ.
- Colin Bennett. The Governance of Privacy – Policy Instruments in Global Perspective. – Ì.: , 2006. – 368 ñ.
- Michael Miller. Absolute PC Security and Privacy. – Ì.: , 2002. – 560 ñ.
- Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
- Beate Rossler. The Value of Privacy. – Ì.: , 2004. – 288 ñ.
- Daniel J Solove. Understanding Privacy. – Ì.: , 2009. – 272 ñ.
- Simson Garfinkel. Web Security, Privacy & Commerce 2e. – Ì.: , 2001. – 790 ñ.
- Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
- Christena E Nippert–eng. Islands of Privacy. – Ì.: , 2010. – 360 ñ.
- Patricia Meyer Spacks. Privacy – Concealing the Eighteenth–Century Self. – Ì.: , 2003. – 248 ñ.
- Simson Garfinkel. Database Nation – The Death of Privacy in the 21st Century. – Ì.: , 2001. – 320 ñ.
- Bruce Schneier. The Electronic Privacy Papers. – Ì.: , 1997. – 748 ñ.
- Kurt H. Decker. A Manager?s Guide to Employee Privacy. – Ì.: , 1989. – 288 ñ.
- Edited by Madeleine Colvin. Developing Key Privacy Rights. – Ì.: , 2011. – 208 ñ.
- John D. R. Craig. Privacy and Employment Law. – Ì.: , 2011. – 320 ñ.
- David Sherborne, Mark Thomson and Hugh Tomlinson QC. The Law of Personal Privacy. – Ì.: , 2011. – 176 ñ.
- D J Solove. The Future Of Reputation – Gossip, Rumour, and Privacy on the Internet. – Ì.: , 2008. – 256 ñ.
- K DECKER. Decker: Employee Privacy Law & Practice 1994 Cumulative Supplement (pr Only). – Ì.: , 1994. – 358 ñ.
- Amy L Fairchild. Searching Eyes – Privacy, the State and Disease Surveillance in America. – Ì.: , 2007. – 372 ñ.
- Stefan Brands. Rethinking Public Key Infrastructures & Digital Certificates – Building in Privacy. – Ì.: , 2000. – 340 ñ.
- Carl D Schneider. Shame, Exposure & Privacy. – Ì.: , 1992. – 202 ñ.
- Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media (Paper). – Ì.: , 1996. – 402 ñ.
- Beatriz Colomina. Privacy & Publicity – Modern Architecture as Mass Media. – Ì.: , 1994. – 402 ñ.
- Hitesh Chhinkaniwala and Sanjay Garg. Privacy Preserving Data Mining - Issues & Techniques. – Ì.: Scholars Press, 2014. – 120 ñ.
- Abdul-Razak Suleman. Loyalty Scheme Enrolment And Privacy Issues. – Ì.: LAP Lambert Academic Publishing, 2012. – 236 ñ.
- Suhel Sayyad and Prakash Kulkarni. Privacy Preserving Back Propagation Algorithm. – Ì.: LAP Lambert Academic Publishing, 2012. – 56 ñ.
- Alex Boniface Makulilo. Privacy and Data Protection in Africa. – Ì.: Scholars' Press, 2014. – 572 ñ.
- Akram M. Almatarneh. The Right to Privacy and Data Protection in the Information Age:. – Ì.: LAP Lambert Academic Publishing, 2015. – 524 ñ.
- Cesare Bartolini. Privacy in the information society and the principle of necessity. – Ì.: LAP Lambert Academic Publishing, 2013. – 108 ñ.
- Dan Sarkar. Examining Privacy Practices of Websites Using Large Scale Data. – Ì.: LAP Lambert Academic Publishing, 2013. – 76 ñ.
- Nadejda Mironov. Public Video Surveillance: ratio of privacy and security in the UK. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
- Faustin Muyembe. Is Privacy Protection Enough?. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
- Alebachew B. Enyew. The Legal Regime on Privacy and Personal Information Protection. – Ì.: LAP Lambert Academic Publishing, 2010. – 68 ñ.
- Dr Hurriyah El Islamy. Privacy as Freedom of Private Life. – Ì.: LAP Lambert Academic Publishing, 2010. – 360 ñ.
- Evert Mouw. Health Privacy and Political Attitudes. – Ì.: LAP Lambert Academic Publishing, 2010. – 72 ñ.
- Àëñó Õóñàåíîâà. Êëàñòåðíûé êîíöåïò PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2011. – 204 ñ.
- Subir Biswas. Security and Privacy in Vehicular Ad hoc Networks. – Ì.: LAP Lambert Academic Publishing, 2013. – 204 ñ.
- Wiem Tounsi. Security and Privacy Controls in RFID Systems. – Ì.: LAP Lambert Academic Publishing, 2014. – 172 ñ.
- Shampa Bhattacharyya and Amit Bhattacharyya. Privacy Preserving Data Mining. – Ì.: LAP Lambert Academic Publishing, 2015. – 100 ñ.
- Sanaz Kavianpour and Zuraini Ismail. Preserving Privacy in Social Network Sites using Anonymity Algorithm. – Ì.: LAP Lambert Academic Publishing, 2013. – 100 ñ.
- Arik Friedman,Ran Wolff and Assaf Schuster. Embedding Privacy in Data Mining. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
- Adeel Anjum. Towards Privacy Preserving Publication of Continuous and Dynamic Data. – Ì.: Scholars' Press, 2013. – 152 ñ.
- Ozlem Ozkan,Osman Saka and Ali Arifoglu. Attitudes Of People Who Use Medical Services About Privacy Of EHR. – Ì.: LAP Lambert Academic Publishing, 2011. – 100 ñ.
- Ali Dehghantanha. Formal Methods for Analyzing Privacy Policies. – Ì.: LAP Lambert Academic Publishing, 2011. – 300 ñ.
- Hammad Kazmi. Security and Privacy issues in Near Field Communication (NFC) Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 68 ñ.
- Anour F.A. Dafa-Alla. Incorporating Background Knowledge in Privacy Preserving Geolocation. – Ì.: LAP Lambert Academic Publishing, 2012. – 140 ñ.
- Murtaza Hussain Shaikh. Probing the Privacy Policy: Retorts & Encounters. – Ì.: LAP Lambert Academic Publishing, 2012. – 136 ñ.
- Ibrahim Yakut and Huseyin Polat. DIMENSIONALITY REDUCTION-BASED RECOMMENDATIONS WITH PRIVACY. – Ì.: LAP Lambert Academic Publishing, 2010. – 80 ñ.
- Sridhar Mandapati. Privacy Preserving Data Mining using Optimization Methods. – Ì.: LAP Lambert Academic Publishing, 2014. – 128 ñ.
- Shinsuke Tamura. Elements of Schemes for Preserving Privacies in e-Society Systems. – Ì.: LAP Lambert Academic Publishing, 2015. – 156 ñ.
- Ali Dehghantanha. Privacy in Pervasive Computing Systems. – Ì.: LAP Lambert Academic Publishing, 2010. – 136 ñ.
- Flavio Bertini. Data privacy in Desktop as a Service. – Ì.: LAP Lambert Academic Publishing, 2014. – 76 ñ.
- Paolo Gasti. Privacy and Security of Internet Communications. – Ì.: LAP Lambert Academic Publishing, 2011. – 148 ñ.
- Jose M. Such,Ana Garcia-Fornes and Agustin Espinosa. Enhancing Privacy in Multi-agent Systems. – Ì.: LAP Lambert Academic Publishing, 2012. – 208 ñ.
- Francesco Pagano. A Distributed Approach to Privacy on the Cloud. – Ì.: LAP Lambert Academic Publishing, 2013. – 216 ñ.
- Yunia Miyayo and Abraham Idowu. Privacy. – Ì.: LAP Lambert Academic Publishing, 2015. – 108 ñ.
Ëó÷øèå ðåçóëüòàòûÍè÷åãî íå íàéäåíîÄîïîëíèòåëüíûå ðåçóëüòàòûÍè÷åãî íå íàéäåíîÎáðàçöû ðàáîò
Çàäàéòå ñâîé âîïðîñ ïî âàøåé òåìå
|
|
Êîíòàêòû
|
|
Ïîäåëèòüñÿ
|
|
Ìû â ñîöèàëüíûõ ñåòÿõ
|
|
Ðåêëàìà
|
|
Îòçûâû
|
J.S., 23.05 | ß íàêîíåö ïîëó÷èë îêîí÷àòåëüíóþ îöåíêó çà ðåôåðàò ïî êèíîêîìåäèè: îòëè÷íî, êàê è îæèäàëîñü.  îñíîâå ðåôåðàòà - ïîëó÷åííûé îò âàñ ìàòåðèàë. ß åãî çíà÷èòåëüíî ñîêðàòèë è íåñêîëüêî ïåðåðàáîòàë, íåìíîãî ïåðåñòðîèë, äîáàâèë ýïèãðàôû è ïðî÷èå öèòàòû à òàêæå êîå-êàêèå ñîáñòâåííûå íåîáÿçàòåëüíûå ðàññóæäåíèÿ. Áîëüøîå ñïàñèáî çà ïîìîùü (Ôàêòè÷åñêè Âàø âêëàä ñîñòàâèë îêîëî 80% ðàáîòû). | |
|