Data integrity

Results: 897



#Item
181Tom DeLay / George W. Bush / George H. W. Bush / Bush family / Politics of the United States / United States

1644 NovAdministration of George W. Bush, 2003 the ‘‘confidentiality, integrity and availability’’ of computer data and systems, as well as

Add to Reading List

Source URL: www.fda.gov

Language: English
182Avionics / Communications protocol / Data transmission / Protocols / Public-key cryptography / Transmission Control Protocol / Global Positioning System / Telecommunication / UMAC / Technology / Cryptography / Data

Secure Ranging With Message Temporal Integrity ˇ Nils Ole Tippenhauer, Kasper Bonne Rasmussen, and Srdjan Capkun Department of Computer Science, ETH Zurich 8092 Zurich, Switzerland {tinils, kasperr, capkuns}@inf.ethz.ch

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-05 06:44:31
183Police Service of Northern Ireland / Northern Ireland / Criminology / United Kingdom / Law enforcement in Northern Ireland / Northern Ireland Policing Board / Law enforcement in the United Kingdom / Crime / Government of Northern Ireland / Northern Ireland peace process / Government of the United Kingdom

Crime data integrity Inspection of the Police Service of Northern Ireland March 2015 © HMIC 2015 ISBN:

Add to Reading List

Source URL: www.justiceinspectorates.gov.uk

Language: English - Date: 2015-03-18 11:26:10
184Hewlett-Packard / HP Integrity Servers / HP-UX / Server hardware / Itanium / HP Superdome / HP Integrity Virtual Machines / Blade server / Windows Server 2008 R2 / Computing / Computer architecture / Software

HP Integrity BL870c i2 Server Blade- Data sheet (US English)

Add to Reading List

Source URL: www.oldamericaninc.net

Language: English - Date: 2013-08-28 02:57:58
185Data quality / Information science / Geographic information system / Database / Data integrity / Data management / Information / Statistics

Digital Geographical Data: Potential Evaluation Vaclav Talhofer Military Land Information Department Faculty of Military Technology, Military Academy in Brno Kounicova 65, Brno, Czech Republic phone: +

Add to Reading List

Source URL: itcnt05.itc.nl

Language: English - Date: 2005-02-27 17:00:00
186Data security / Windows Vista / Windows / Computer architecture / Computer file / Software / Microsoft Windows / Computing / Backup

The CAP 2014 The Integrity System This manual is designed to be a reference to some basic

Add to Reading List

Source URL: www.pemsoftware.com

Language: English - Date: 2014-10-30 16:01:09
187McAfee / Hacking / Computer network security / Antivirus software / SCADA / Vulnerability / Operation Aurora / Threat / Host Based Security System / Cyberwarfare / Computer security / Security

Data Sheet McAfee Embedded Control System integrity, change control, and policy compliance in one solution for integrated control systems

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-28 13:56:11
188Corporate crime / Tyco International / Companies listed on the New York Stock Exchange / General Electric / Project management / Data center / Server / Florida / Concurrent computing / Distributed computing / Computing

CASE STUDY: Project Management Solution Consultis Program Manager Successfully Oversees Comprehensive Project at Tyco Safety Products, Ensuring Data Security, Integrity and Availability

Add to Reading List

Source URL: www.consultis.com

Language: English - Date: 2013-08-01 14:23:46
189Computer network security / Public safety / Computer security / Data security / Information security / Network Access Control / BigFix / Security / Crime prevention / National security

» Solution Brief Promisec Endpoint Manager Restoring Integrity across Infrastructure, Applications and Users

Add to Reading List

Source URL: www.promisec.com

Language: English - Date: 2014-04-07 10:06:50
190Computer network security / Cyberwarfare / Crime prevention / National security / Information security / Security controls / Backup / Vulnerability / Password / Security / Data security / Computer security

QuestionPro Security Overview At QuestionPro, the security of customer data is a top priority. QuestionPro is committed to the confidentiality, integrity, and

Add to Reading List

Source URL: www.questionpro.com

Language: English - Date: 2014-09-28 01:00:30
UPDATE