Data security

Results: 28926



#Item
301Computing / Software / System software / System administration / Data security / Splunk / Cisco Systems / Cisco Unified Computing System / Cisco Meraki / Cisco IOS / Network security / Cisco Catalyst

PARTNER BRIEF SPLUNK AND CISCO Operational Intelligence Across Your Cisco Environment and Beyond • Splunk integrations with Cisco products

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-23 09:54:07
302Prevention / Computer security / Safety / Security / Data security / Cryptography / Information security / National security / Regulatory compliance

-Montana Operations Manual STANDARD TEMPLATE Category

Add to Reading List

Source URL: sitsd.mt.gov

Language: English - Date: 2016-04-18 15:42:36
303Privacy / Data security / Identity management / Law / Internet privacy / Government / Personally identifiable information / Prevention / Medical privacy / Privacy policy / Privacy concerns with social networking services

UC Irvine Privacy Impact Assessment The University has obligations to protect Personally Identifiable Information (PII) under state and federal laws and UC policies and values. PII is defined as any information that desc

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 19:33:16
304Data security / Prevention / Security / Safety / Privacy / Computer security / Cryptography / Information security / National security / Internet privacy / Personally identifiable information / Policy

Category Montana Operations Manual POLICY Information Technology,

Add to Reading List

Source URL: www.lakemt.gov

Language: English - Date: 2016-06-13 14:12:50
305Security engineering / Computing / Security / Software architecture / Web API / Big data / Computer security / Endpoint security

secpod SecPod Ancor – An Innovative and Scalable Platform SecPod Ancor provides threat intelligence, endpoint monitoring and protection capabilities with speed, agility, scalability and resilience required for managing

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2016-06-09 07:44:08
306Economy / Computing / Business / Data management / Financial markets / Blockchain / Cryptocurrencies / Chief data officer / Big data / Computer security / Market data / Corporate title

FREE attendance for qualified end users August 17

Add to Reading List

Source URL: events.waterstechnology.com

Language: English - Date: 2016-07-25 03:43:20
307Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: www.financial-ombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
308Digital rights / Human rights / Privacy / Identity management / Law / Data security / Information privacy / Internet privacy / Medical privacy / Digital media / Right to privacy / Privacy International

CALL FOR PAPERS Workshop on Privacy and Data Protection in Europe: Traditions, Practices, and Discourses

Add to Reading List

Source URL: www.mill-institut.de

Language: English - Date: 2015-02-18 06:28:32
309Prevention / Security / Safety / Computer security / Data security / National security / Cryptography / Information security / Family Educational Rights and Privacy Act / Health Insurance Portability and Accountability Act / Medical privacy / Privacy

RFP Information Security Requirements

Add to Reading List

Source URL: forallschools.s3.amazonaws.com

Language: English - Date: 2015-06-14 20:29:02
310Computing / Software engineering / Computer architecture / Method / Data types / X86 architecture / Assembly languages / Virtual method table / Subroutines / X86 assembly language / Low-level programming language / Dangling pointer

¨ BOCHUM RUHR-UNIVERSITAT Horst G¨ortz Institute for IT Security Technical Report TR-HGI

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2014-12-17 10:12:31
UPDATE