Data security

Results: 28926



#Item
391Battery electricity) / Rechargeable batteries / Leadacid battery / Battery / Separator / VRLA battery / Lithium-ion battery

Data Sheet NP SERIES - NP 4-6 Reliability is your Security Utilizing the latest advance design Oxygen Recombination Technology, Yuasa have applied

Add to Reading List

Source URL: www.yuasabatteries.com

Language: English - Date: 2009-03-25 20:30:00
392Information privacy / Health / Information / Health informatics / Data security / Electronic health records / Data protection / Health Insurance Portability and Accountability Act / Medical privacy / Privacy / De-identification / Big data

Balancing the Need for Privacy and the Value of Big Data EHR Association Response to the PCAST Report, Big Data and Privacy: A Technological Perspective The President’s Council of Advisors on Science and Technology (PC

Add to Reading List

Source URL: www.himssehra.org

Language: English - Date: 2014-10-23 14:13:55
393Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:27
394Information technology management / Prevention / Information technology / Security / Risk / Data security / IT risk management / Risk analysis / IT risk / ISO 31000 / ISO/IEC 27000-series / ISO/IEC 20000

Neue Subnorm ISOfür Risikomanagement

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:36
395Mass surveillance / National security / Surveillance / Security / Investigatory Powers Bill / Bulk personal datasets / Data Retention and Investigatory Powers Act / Intelligence and Security Committee of Parliament / Data retention / Telecommunications data retention / Regulation of Investigatory Powers Act / Mass surveillance in the United Kingdom

Investigatory Powers Bill: Briefing for Lords Stages

Add to Reading List

Source URL: researchbriefings.files.parliament.uk

Language: English - Date: 2016-06-21 10:06:18
396Computer security / Security / Computing / Data security / Information Security Forum / Crime prevention / Cryptography / National security / Standard of Good Practice / Information security / Payment Card Industry Data Security Standard / COBIT

2014 ISF 25th Anniversary Logo Blue with Red Text

Add to Reading List

Source URL: www.securityforum.org

Language: English - Date: 2015-11-27 07:52:37
397Government / Law / Privacy law / Data security / Prevention / Information privacy / Computer security / National security / Privacy / Medical privacy / Internet privacy / Information security

KENNEDY HEALTH CARE GROUP PRIVACY POLICY AND PROCEDURE 1 POLICY

Add to Reading List

Source URL: www.kennedyhealthcare.com.au

Language: English - Date: 2014-03-05 22:00:36
398Data security / Information Systems Security Association / Minutes / Crowne Plaza / Computing / Information

ISSA: Chapter Board Meeting Minutes July 2, :30am - 1:00pm Crowne PlazaN. IH 35 Austin, TXPresiding Officer: Auston Holt, Vice President

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2015-07-06 09:27:52
399Security / Computer security / Identity management / Prevention / Micro Focus International / RUMBA / Access control / Security and safety features new to Windows Vista / Remote Desktop Services

Data Sheet Host Access Management and Security Server Host Access Management and Security Server Working alongside your Reflection®, Extra!®, Rumba+®, and InfoConnect® software, Micro Focus® Host

Add to Reading List

Source URL: www.attachmate.com

Language: English - Date: 2016-06-20 17:08:49
400Computer security / Security / Prevention / Crime prevention / Data security / National Security Agency / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level

Microsoft Word - scheme-differences-2013.docx

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
UPDATE