00991nam a2200253 a 4500991001370649707536 887573318Xb13362288-39ule_instDip.to di Studi Storiciita949.72Ercolani, Antonella509823La fondazione del Fascio di combattimento a Fiume tra Mussolini e D'Annunzio /Antonella ErcolaniRoma :Bonacci,1996243 p. ;21 cmSaggi e ricerche ;17Fasci di combattimentoFiumeSpedizione di Fiume 1919-1920.b1336228821-09-0607-12-05991001370649707536LE023 949.72 ERC 1 112023000093733le023-E14.49-l- 01010.i1416581807-12-05Fondazione del Fascio di combattimento a Fiume tra Mussolini e D'Annunzio1093608UNISALENTOle023 - - ma -itait 3002676nam 22005893 450 991102197760332120251005110054.01-394-34266-71-394-34264-01-394-34265-910.1002/9781394342662(CKB)40331109700041(MiAaPQ)EBC32265617(Au-PeEL)EBL32265617(OCoLC)1534199896(CaSebORM)9781394342631(OCoLC)1533595849(OCoLC-P)1533595849(EXLCZ)994033110970004120250823d2025 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierBuilding Effective Privacy Programs Cybersecurity from Principles to Practice1st ed.Newark :John Wiley & Sons, Incorporated,2025.©2026.1 online resource (451 pages)1-394-34263-2 Introduction to Privacy -- Understanding Personal Data -- Data Processing -- Roles and Relationships -- Privacy Impact Assessments (PIA) -- Roles in Privacy Leadership -- Data Subject Rights (DSR) -- Privacy Frameworks and Standards -- Major Privacy Laws and Regulations -- International Privacy Concerns -- Regulatory Enforcement -- Privacy by Design and Default -- Privacy Technology and Tools -- Data Breach Management -- Emerging Privacy Trends -- Privacy Program Implementation -- Privacy Training and Awareness -- Privacy Audits & Assessments."Privacy has evolved significantly over time, shaped by cultural, legal, and technological changes. In today's interconnected and data-driven world, it is not merely a personal right but a critical societal issue. The rise of global privacy regulations, technological advances, and increasing concerns over data breaches and surveillance underscores the urgency of comprehensively understanding and addressing privacy"--Provided by publisher.Privacy-preserving techniques (Computer science)Data protectionData privacyComputer securityPrivacy-preserving techniques (Computer science)Data protection.Data privacy.Computer security.005.8Edwards Jason919105Weaver Griffin1845412John Wiley & Sons,MiAaPQMiAaPQMiAaPQBOOK9911021977603321Building Effective Privacy Programs4429244UNINA