Data security

Results: 28926



#Item
351Security / Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / Secure communication / Internet privacy / Privacy

EEMA online January 2015 Issue 1 EEMA conferences Trust in the Digital World 2015 Trusting Big Data: driving new business without compromising privacy 25–26 February 2015, Madrid

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
352Security / Prevention / Computer security / Data security / Crime prevention / Cryptography / National security / Information security / ISO/IEC 27001:2013 / Security controls

VPDSF Rosetta Stone (Core) CORE VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) ROSETTA STONE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-06-28 19:52:48
353Computing / Security / Computer security / E-commerce / Secure communication / Tor / Ricochet / Software testing / Cryptography / Vulnerability / Transport Layer Security / Data validation

Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Add to Reading List

Source URL: penetrationstest.se

Language: English - Date: 2016-04-11 13:49:12
354Prevention / Risk / Economy / Auditing / Security / Data security / Computer security / Actuarial science / ISO/IEC 27001:2013 / Audit / Regulatory compliance / Professional certification

           

Add to Reading List

Source URL: www.isignthis.com

Language: English - Date: 2015-07-15 00:02:13
355Computing / OSI protocols / Network architecture / Data transmission / Communications protocol / Network protocols / Cryptographic protocol / Internet protocol suite / OSI model / Transport layer / Datagram / ProVerif

Developing teaching material for formal modeling of security protocols Daming Chen and Michael Huth Overview •

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:12
356Data security / Privacy / East Coast of the United States / Data management / Computing / Eastern United States / Connecticut State Department of Education / Connecticut / Personal /  Inc. / Personally identifiable information / Data Protection Act / Telecommunications (Interception and Access) Amendment (Data Retention) Act

Sec. 10-3a pageState Department of Education TABLE OF CONTENTS

Add to Reading List

Source URL: www.sde.ct.gov

Language: English - Date: 2012-05-10 14:41:04
357Security / Computer network security / Cyberwarfare / Computer security / Cryptography / National security / Secure communication / Bypass switch

SmartWall® THREAT DEFENSE SYSTEM DATA SHEET

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-10-01 16:15:05
358Backup / Data security / Cloud storage / Computing / Backup software / Online backup services / Computer data storage

CLIENT SUCCESS STORY WHEN CRITERIA FOR SUCCESS FOUND THEIR SERVER SITTING IN A POOL OF WATER THEY KNEW THEY NEEDED A BETTER WAY TO SECURE THEIR DATA Sales improvement consultancy turns to KeepItSafe to improve their own

Add to Reading List

Source URL: www.keepitsafej2.co.uk

Language: English - Date: 2016-08-18 06:15:35
359Computing / Computer network security / Network architecture / Wireless networking / Local area networks / IEEE 802.11 / Computer security / IEEE 802.11e-2005 / Wireless security / Denial-of-service attack / Data link layer / Transmission Control Protocol

Detecting Identity Spoofs in IEEE 802.11e Wireless Networks

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English
360Economy / Information privacy / Payment cards / Computing / Payment systems / Money / E-commerce / PA-DSS / Payment Card Industry Data Security Standard / Information security / Payment card industry / DSS

Payment Card Industry (PCI) Payment Application Data Security Standard Summary of Changes from

Add to Reading List

Source URL: pcidss.ru

Language: English - Date: 2014-04-09 03:31:52
UPDATE