Search

Your search keyword '"DATA protection"' showing total 2,660 results

Search Constraints

Start Over You searched for: Descriptor "DATA protection" Remove constraint Descriptor: "DATA protection" Topic computer software Remove constraint Topic: computer software
2,660 results on '"DATA protection"'

Search Results

1. Hiding image into image with hybrid attention mechanism based on GANs

2. GDPR consent management and automated compliance verification tool

3. Application of Personal data protection on electronic signatures in Indonesia.

4. A Reference Design Model to Manage Consent in Data Subjects-Centered Internet of Things Devices

6. Proposed ethical framework for software requirements engineering

7. Hybrid domain digital watermarking scheme based on improved differential evolution algorithm and singular value block embedding

8. DETECTION OF NON-PERSONAL DATA LEADING TO USER IDENTIFICATION, INCLUDING RELATED RECOMMENDATIONS FOR THE FIELD OF AUTONOMOUS MOBILITY.

9. End-to-End Database Software Security.

10. Linux & Windows: Das Duell.

11. P-Chain: Towards privacy-aware smart contract using SMPC.

12. Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning

13. Inhalt.

14. Driving openness - the myths about data and software access in the Data and Cloud Policy.

15. SecureVision: An Open-Source User-Customizable Image Encryption Program.

16. Cyber warriors.

17. So wird Ihr Online-Coaching interaktiv.

18. Local Reasoning for Global Invariants, Part II: Dynamic Boundaries.

19. Sicherheit von Daten und Geheimnis im Vertrag — GeschGehG und vertragliche Pflichten zum technischen Schutz von nicht-personenbezogenen Daten.

20. Do Blockchain Technologies Make Us Safer? Do Cryptocurrencies Necessarily Make Us Less Safe?

21. A Quarter Century of International Copyright on Software.

22. Privacy by Design und Software: Berücksichtigung datenschutzrechtlicher Anforderungen bei der Softwarebeschaffung.

23. TRANSPARENCIA Y APLICACIONES INFORMÁTICAS EN LA ADMINISTRACIÓN TRIBUTARIA.

24. Least Significant Bit Steganography Method for the Digital Data Protection in the Barcode.

25. Desarrollo de una web segura

26. DOWNLOAD £500 OF SOFTWARE FO RFREE!

27. The software industry is the problem.

28. Cloud forecasting: Legal visibility issues in saturated environments.

29. Is Open Source Security a Myth?

30. DETECTION AND PREVENTION OF STACK BUFFER OVERFLOW ATTACKS.

31. IS SPYWARE AN Internet Nuisance or Public Menace?

32. WHY HACKERS ARE A GIANT THREAT TO MICROSOFT'S FUTURE.

33. Vigilantes on the net.

34. The Relationship between DISTRIBUTED SYSTEMS and OPEN SOURCE DEVELOPMENT.

35. Malware Month.

36. EPIDEMIC.

37. Computer Security: Quality Rather than Quantity.

39. Attacker-Centric View of a Detection Game against Advanced Persistent Threats.

40. Partial multi-view spectral clustering.

41. Personal digital bodyguards for e-security, e-learning and e-health: A prospective survey.

42. Software Protection Algorithm based on Control Flow Obfuscation.

43. mHealth and telemedicine apps: in search of a common regulation.

44. Software Approaches and Methods to Ensure the Security of Interactive Systems.

45. A SOFTWARE TOOL TO SUPPORT THE SELECTION OF CANDIDATES IN PRIVATE SECURITY SERVICES.

46. Psst, Can You Keep a Secret?

47. Two-party secure connection in Bluetooth-enabled devices.

48. Exploiting the Parallelism Between Conflicting Critical Sections with Partial Reversion.

49. Editorial Manager.

50. Crytographic Sealing for Information Secrecy and Authentication.

Catalog

Books, media, physical & digital resources