Data security

Results: 28926



#Item
491Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:00
492Data security / Information Systems Security Association / Minutes / Crowne Plaza / Computing / Information technology / Information

ISSA: Chapter Board Meeting Minutes April 2, :30am - 1:00pm Crowne PlazaN. IH 35 Austin, TXPresiding Officer: Jackie Wilson, President

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2015-05-09 11:35:54
493Smart cards / Computing / Security / Ubiquitous computing / Computer access control / ISO standards / HID Global / MIFARE / Card reader / Java Card OpenPlatform / Java Card / Access control

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
494Information privacy / Payment cards / Economy / Computing / E-commerce / Business / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:04
495Security / Computer security / Information technology management / Data security / System administration / Splunk / Computer network security / Cyberwarfare / Cryptography

SECURITY PROFESSIONAL SERVICES Security Program Review Services Improve Your Security Posture Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-01-08 01:13:16
496Computing / Information technology / Data management / Data / Business intelligence / Big data / Computer security / Formal sciences / Threat / Analytics / Data warehouse

Solutions Threat Intelligence Vanquish Digital Threats: Internal

Add to Reading List

Source URL: www.koverse.com

Language: English - Date: 2015-09-29 12:19:29
497Computing / Data security / Anomaly detection / Data mining / Computer programming / Cloud computing / Cloud storage / Tracing / Data lineage / CELAR

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
498Prevention / Safety / Business / Computer security / Crime prevention / Cryptography / Data security / Information security / National security / Occupational safety and health / BlackBerry Limited

VISION o f t h e C O M P AN Y RMS, a.s. Košice

Add to Reading List

Source URL: www.rms-kosice.sk

Language: English - Date: 2014-05-06 05:28:33
499Privacy / Data security / Identity documents / Internet privacy / Personally identifiable information / Computing / Gmail / Medical privacy / Government / Structure

Privacy Policy Table of Contents 1. Purpose of Collection and Use of Personal Information 2. Range of Personal Information 3. Maintenance and Disuse of Personal Information 4. Range of Cookie Use

Add to Reading List

Source URL: www.icap2016.org

Language: English - Date: 2016-03-14 20:28:10
500Prevention / Security / Safety / Computer security / Cryptography / Data security / Information security / National security / Password

Manual for the Access to and Use of FaHCSIA Longitudinal Survey Datasets

Add to Reading List

Source URL: melbourneinstitute.com

Language: English - Date: 2014-02-26 18:10:16
UPDATE