Spelling suggestions: "subject:"confidentiality communications.""
31 |
Auditor orientation, strategies and tactics in audit negotiations /Hollindale, Janice. January 2008 (has links)
Thesis (MCom (Hons)) -- Bond University, 2008. / "A thesis submitted in total fulfillment of the requirements of the degree of Master of Commerce (Honours)"-- t.p. Bibliography: leaves 100-104.
|
32 |
Probleme der Amtshilfe und Amtsverschwiegenheit in der Jugendhilfe /Kaufmann, Ferdinand, January 1973 (has links)
Thesis (doctoral)--Universität zu Köln, 1973. / Includes bibliographical references (p. vii-xvi).
|
33 |
Ethics, privacy, and confidentiality issues related to the application of information technology in health careMason, Barbara Ann Borgstede, January 1999 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 1999. / Typescript. Vita. Includes bibliographical references (leaves 133-137). Also available on the Internet.
|
34 |
Legal privilege und Nemo tenetur im reformierten europäischen Kartellermittlungsverfahren der VO 1-2003 : eine Untersuchung der Rechtslage im Gemeinschaftsrecht unter Berücksichtigung der Massgaben von EMRK, IPBPR und Grundrechtscharta sowie der aktuellen Rechtsprechung von EuGH, EuG und EGMR /Schubert, Daniel. January 2009 (has links)
Zugl.: Berlin, Freie Univ., Diss., 2008 / Includes bibliographical references (p. [533]-554) and index.
|
35 |
Ethics, privacy, and confidentiality issues related to the application of information technology in health care /Mason, Barbara Ann Borgstede, January 1999 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 1999. / Typescript. Vita. Includes bibliographical references (leaves 133-137). Also available on the Internet.
|
36 |
"According to my sources..." A proposed constitutional framework for adjudicating reporter-source confidentiality in Canada.Medeiros, Damian J. A. January 2009 (has links)
Thesis (LL.M.)--University of Toronto, 2009. / Source: Masters Abstracts International, Volume: 48-02, page: .
|
37 |
Public key infrastructure utilization to provide an added level of authenticity to transmitted dataBlackmon, Jason B. January 2010 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2010. / Thesis Advisor(s): Buddenberg, Rex. Second Reader: Housel, Thomas. "March 2010." Description based on title screen as viewed on April 27, 2010. Author(s) subject terms: Public key infrastructure, user agent, authenticity, confidentiality, integrity. Includes bibliographical references (p. 47-48). Also available in print.
|
38 |
Challenging policies that do not play fair : a credential relevancy framework using trust negotiation ontologies /Leithead, Travis S., January 2005 (has links) (PDF)
Thesis (M.S.)--Brigham Young University. Dept. of Computer Science, 2005. / Includes bibliographical references (p. 77-83).
|
39 |
La protection du secret rédactionnel /Werly, Stéphane. January 2005 (has links)
Thesis (doctoral)--Université de Genève. / Includes bibliographical references (p. 311-344).
|
40 |
Not saying what's on your mind how speakers avoid grounding references in privileged information /Wardlow Lane, Liane Christine. January 2007 (has links)
Thesis (Ph. D.)--University of California, San Diego, 2007. / Title from first page of PDF file (viewed June 5, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
|
Page generated in 0.1297 seconds