Suchergebnisse
Unser Katalog
Artikel & mehr
Suchmaske
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Art der Quelle
Thema
- personal information 6 Treffer
- privacy policy 5 Treffer
- privacy requirement 4 Treffer
- data privacy 3 Treffer
- privacy rule 3 Treffer
-
32 weitere Werte:
- private component 3 Treffer
- activity diagram 2 Treffer
- business rule 2 Treffer
- oecd guideline 2 Treffer
- privacy engineering 2 Treffer
- unify modeling language 2 Treffer
- audit committee 1 Treffer
- business group 1 Treffer
- business process 1 Treffer
- call center 1 Treffer
- chief information officer 1 Treffer
- children's online privacy protection act (coppa) 1 Treffer
- consent decree 1 Treffer
- customer equity 1 Treffer
- customer order 1 Treffer
- data asset 1 Treffer
- data protection 1 Treffer
- federal trade commission 1 Treffer
- identity theft 1 Treffer
- information security 1 Treffer
- intel corporation 1 Treffer
- intellectual property 1 Treffer
- internal audit 1 Treffer
- metadata 1 Treffer
- movable type 1 Treffer
- personal data 1 Treffer
- private note 1 Treffer
- product lifecycle 1 Treffer
- quality assurance 1 Treffer
- readiness assessment 1 Treffer
- requirement engineering 1 Treffer
- silk road 1 Treffer
Inhaltsanbieter
16 Treffer
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 321-338Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 279-298Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 339-354Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 299-320Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 257-276Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 229-256Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 93-120Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 121-160Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 189-202Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 179-188Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 161-178Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 203-226Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 75-92Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 3-24Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 51-72Online E-BookZugriff:
-
In: The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value; (2014) S. 25-50Online E-BookZugriff: