Kerahsiaan = confidentiality
Saved in:
| Format: | Book |
|---|---|
| Language: | Miscellaneous languages |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Multiple AIDS-related loss a handbook for understanding and surviving a perpetual fall
by: Nord, David
Published: (1997)
by: Nord, David
Published: (1997)
Beyond the HIPAA privacy rule enhancing privacy, improving health through research /
Published: (2009)
Published: (2009)
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018)
Published: (2018)
The complete diagnosis coding book
by: Safian, Shelley C.
Published: (2012)
by: Safian, Shelley C.
Published: (2012)
Electronic health record standards, coding systems, frameworks, and infrastructures
by: Sinha, Pradeep K., et al.
Published: (2013)
by: Sinha, Pradeep K., et al.
Published: (2013)
The Right to Privacy
by: Brandeis, Louis Dembitz, 1856-1941
Published: (2011)
by: Brandeis, Louis Dembitz, 1856-1941
Published: (2011)
Personal data and privacy protection
by: Abdul Raman Saad
Published: (2005)
by: Abdul Raman Saad
Published: (2005)
Terminal Compromise
by: Schwartau, Winn
Published: (1993)
by: Schwartau, Winn
Published: (1993)
Human rights and the private sphere a comparative study
Published: (2007)
Published: (2007)
Driving quality in informatics fulfilling the promise
Published: (2015)
Published: (2015)
Negotiating privacy the European Union, the United States, and personal data protection
by: Heisenberg 1963-
Published: (2005)
by: Heisenberg 1963-
Published: (2005)
Your family medical record an interactive guide to getting the best care
by: Hester, A. Maria
Published: (2000)
by: Hester, A. Maria
Published: (2000)
End-user privacy in human-computer interaction
by: Iachello, Giovanni
Published: (2007)
by: Iachello, Giovanni
Published: (2007)
Modern recording techniques
by: Huber, David Miles, et al.
Published: (2018)
by: Huber, David Miles, et al.
Published: (2018)
Magnetic information storage technology
by: WanglhShan X
by: WanglhShan X
Who know safeguarding your privacy in a networked world
by: Cavoukian
Published: (1997)
by: Cavoukian
Published: (1997)
Trust, Security and Privacy for Big Data /
Published: (2022)
Published: (2022)
Security and privacy management, techniques, and protocols
Published: (2018)
Published: (2018)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Trust on the world wide web a survey
by: Golbeck, Jennifer
Published: (2008)
by: Golbeck, Jennifer
Published: (2008)
The 2009-2014 world outlook for records management (RM) solutions
by: Parker, Philip M., 1960-
Published: (2008)
by: Parker, Philip M., 1960-
Published: (2008)
Ediphone School Record No. 2 90 WPM-1
Published: (2003)
Published: (2003)
Homeland security threats, countermeasures, and privacy issues
Published: (2011)
Published: (2011)
Sound recording the life story of a technology
by: Morton, David 1964-
Published: (2004)
by: Morton, David 1964-
Published: (2004)
Audio in media
by: Alten, Stanley R.
Published: (2014)
by: Alten, Stanley R.
Published: (2014)
Practical VCR repair
by: Ronan lhDavid T
by: Ronan lhDavid T
Siegel-Myers School of Music - Vocal Record F
Published: (2003)
Published: (2003)
Plaque No. 2 Exp. No. 5-6-7-8, Recorder #20
by: Losey's Orchestra
Published: (2003)
by: Losey's Orchestra
Published: (2003)
Effective document management unlocking corporate knowledge
by: WigginslhBob
by: WigginslhBob
2nd Record
by: Losey's Orchestra
Published: (2003)
by: Losey's Orchestra
Published: (2003)
Plaque No. 1 Exp. No. 1-2-3-4, Recorder #20
by: Losey's Orchestra
Published: (2003)
by: Losey's Orchestra
Published: (2003)
Sound systems design and optimization : modern techniques and tools for sound system design and alignment
by: McCarthy, Bob
Published: (2010)
by: McCarthy, Bob
Published: (2010)
Proceedings of National Seminar on Management of Corporate Memory key challengs, issues and trends, 27th September 2004, Convention Centre, Concorde Hotel, Shah Alam
Published: (2005)
Published: (2005)
Data protection law and practice
by: Jay
Published: (2007)
by: Jay
Published: (2007)
Risk and the war on terror
Published: (2008)
Published: (2008)
Ethical, legal and social issues in medical informatics
Published: (2008)
Published: (2008)
Public sector records management a practical guide by Kelvin Smith
by: Smith
Published: (2007)
by: Smith
Published: (2007)
Guinness world records 2009
Published: (2008)
Published: (2008)
Analysis of differences in penalty corner pattern between winnging and losing team in women Malaysian hockey league
by: Aizuddin Amri Zainuddin
Published: (2021)
by: Aizuddin Amri Zainuddin
Published: (2021)
Similar Items
-
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010) -
Multiple AIDS-related loss a handbook for understanding and surviving a perpetual fall
by: Nord, David
Published: (1997) -
Beyond the HIPAA privacy rule enhancing privacy, improving health through research /
Published: (2009) -
Handbook of research on information and cyber security in the fourth industrial revolution
Published: (2018) -
The complete diagnosis coding book
by: Safian, Shelley C.
Published: (2012)