Narrow your search

Library

KU Leuven (4734)

ULiège (4232)

Odisee (3628)

VIVES (3610)

Thomas More Mechelen (3592)

Thomas More Kempen (3586)

ULB (3550)

UCLL (3507)

UGent (2597)

KBC (1419)

More...

Resource type

book (6222)

periodical (142)

digital (40)

undetermined (24)

dissertation (15)

More...

Language

English (5702)

French (341)

German (183)

Dutch (102)

Spanish (21)

More...

Year
From To Submit

2024 (114)

2023 (282)

2022 (317)

2021 (370)

2020 (420)

More...
Listing 1 - 10 of 6396 << page
of 640
>>
Sort by

Book
Problemas legislativos de la protección de datos : conferencia Internacional, Madrid, 11-13 Junio 1984
Authors: ---
ISBN: 9788474710700 8474710707 Year: 1986 Publisher: [Madrid]: Servicio central de publicaciones,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
EC data protection directive : interpretation, application, transposition : working conference
Author:
ISBN: 9783878200949 3878200943 Year: 1997 Publisher: Darmstadt: STMV,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Bundesdatenschutzgesetz : (BDSG) : mit Landesdatenschutzgesetzen und internationalen Vorschriften : Textausgabe
Authors: --- ---
ISBN: 9783789023538 3789023531 Year: 1991 Publisher: Baden-Baden: Nomos,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2014 International Symposium on Biometrics and Security Technologies (ISBAST) : 26-27 Aug. 2014, Kuala Lumpur, Malaysia
Author:
ISBN: 1479964433 147996445X 1479964441 Year: 2014 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Biometric and security technologies are the key components for providing reliable solution against cyber terrorism or damage in order to improve the nation safety Biometric provides methods to identify the uniqueness of each individual identity Therefore with biometric solution, scientists are able to determine ways to accurately identify people based upon their physical and behavioral characteristics However, improvements in biometric equipment, interoperability and database accuracy are crucial for nation safety This is also applied for other security technology solutions ISBAST2014 provides researchers with an excellent platform for dissemination of latest research findings and the state of practice in the areas of biometric and security technologies This conference covers areas such as biometric, forensic, cloud computing, network security and cybersecurity However, the scope is not limited to the aforementioned areas ISBAST2014 enables participants to learn the latest tre.

Keywords

Data protection


Book
2015 International Conference on Information Systems Security and Privacy (ICISSP)
Author:
ISBN: 1467384054 9897581359 Year: 2015 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The International Conference on Information Systems Security and Privacy aims at creating a meeting point of researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of security and privacy, such as methods to improve the accuracy of data, encryption techniques to conceal information in transit and avoid data breaches, identity protection, biometrics, access control policies, location information and mobile systems privacy, transactional security, social media privacy control, web and email vulnerabilities, trust management, compliance violations in organizations, security auditing, and so on.

Keywords

Data protection


Book
7002-2022 - IEEE Standard for Data Privacy Process
Author:
ISBN: 1504484525 Year: 2022 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The requirements for a systems/software engineering process for privacy-oriented considerations regarding products, services, and systems utilizing employee, customer, or other external user's personal data are defined by this standard. Organizations and projects that are developing and deploying products, systems, processes, and applications that involve personal information are candidate users of the IEEE Std 7002™ standard. Specific procedures, diagrams, and checklists are provided for users of the IEEE Std 7002 standard to perform conformity assessments on their specific privacy practices. Privacy impact assessments (PIAs) are described as a tool for both identifying where privacy controls and measures are needed and for confirming they are in place.

Keywords

Data protection.


Book
La tutela dei dati personali : commentario alla L. 675/1996
Authors: --- --- ---
ISBN: 9788813202408 8813202407 Year: 1997 Publisher: Padova: CEDAM,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Data protection


Book
Le Banche dati in Italia : realta normativa e progetti di regolamentazione
Authors: --- ---
Year: 1985 Publisher: Napoli: Jovene,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Data protection


Book
La protección de datos en Europa : principios, derechos y procedimiento
Author:
ISBN: 9788492373109 8492373105 Year: 1998 Publisher: Madrid: Grupo Asnef Equifax,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Data protection


Book
Kommentar zum Bundesdatenschutzgesetz
Author:
ISBN: 3789003573 9783789003578 Year: 1978 Publisher: Baden-Baden: Nomos,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Data protection

Listing 1 - 10 of 6396 << page
of 640
>>
Sort by