111 |
Identifying the objectives of EU data protection regulation and justifying its costsLynskey, Orla January 2013 (has links)
No description available.
|
112 |
Information privacy rights of the individual versus the public's right to freedom of information.Pillay, Pregala. January 1995 (has links)
No abstract available. / Thesis (MPA)-University of Durban-Westville, 1995.
|
113 |
A formal protection model of security in distributed systemsBenson, Glenn Stuart 08 1900 (has links)
No description available.
|
114 |
Computer security : data control and protectionNeophytou, Andonis January 1992 (has links)
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study. / Department of Computer Science
|
115 |
Advanced methods for detection of malicious softwareVolynkin, Alexander S. January 2007 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Electrical and Computer Engineering Department, Watson School, 2007. / Includes bibliographical references.
|
116 |
An automated web crawl methodology to analyze the online privacy landscape /Sarkar, Chandan. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2008. / Printout. Includes bibliographical references (leaves 75-78). Also available on the World Wide Web.
|
117 |
Security and privacy model for association databasesKong, Yibing. January 2003 (has links)
Thesis (M.Comp.Sc.)--University of Wollongong, 2003. / Typescript. Bibliographical references: leaf 93-96.
|
118 |
Embedded watermarking for image verification in telemedicineOsborne, Dominic. January 2005 (has links)
Thesis (Ph. D.)--University of Adelaide, School of Electrical and Electronic Engineering, 2005. / Title from t.p. of source document (viewed Apr. 2, 2007). Includes bibliographical references (p. 187-194). Also available in print version.
|
119 |
Robust digital watermarking of multimedia objectsGupta, Gaurav. January 2008 (has links)
Thesis (PhD)--Macquarie University, Division of Information and Communication Sciences, Department of Computing, 2008. / Bibliography: p. 144-153.
|
120 |
Differences in self-reported perceptions of privacy between online social and commercial networking users /Hughes, Jessie. January 2008 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2008. / Typescript. Includes bibliographical references (leaves 22-25).
|
Page generated in 0.1053 seconds