Data security

Results: 28926



#Item
521Information privacy / Payment cards / Computing / Business / Economy / Computer law / E-commerce / Payment Card Industry Data Security Standard / Peripheral Component Interconnect / Qualys / Conventional PCI / Payment card industry

PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-03-18 15:34:30
522Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
523Economy / Money / E-commerce / Payment systems / Merchant services / Electronic funds transfer / Payment cards / Credit card / Payment gateway / Payment Card Industry Data Security Standard / E-commerce payment system / Netbanx

Payment Express Security Policy Template According to PCI DSS mandates, merchants are required to display an information security policy addressing credit card information. Payment Express offers this template for any ec

Add to Reading List

Source URL: www.paymentexpress.com

Language: English - Date: 2016-05-31 00:14:18
524Security / Computing / Prevention / Automatic identification and data capture / User interface techniques / Crime prevention / Cryptography / National security / Internet privacy / Speech recognition / Computer security / Speaker recognition

Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol II, IMECS 2014, March, 2014, Hong Kong Business Buddy: Connecting You and Your Business Partners Kenneth Kin Pong Kwo

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2014-04-10 12:20:58
525Income distribution / Tax credits / Taxation / Earned income tax credit / Income tax in the United States / Tax refund / Social Security / Income tax in Australia / Income tax

Cash-on-Hand & College Enrollment: Evidence from Population Tax Data and the Earned Income Tax Credit Day Manoli Nick Turner*

Add to Reading List

Source URL: www.daymanoli.com

Language: English - Date: 2015-03-25 11:33:09
526Data security / Information Systems Security Association / Chambers of commerce / Business / Economy / Commerce / Loveland Chamber of Commerce

Rolls of architecture blueprints concept

Add to Reading List

Source URL: www.chamberorganizer.com

Language: English - Date: 2016-03-16 11:12:26
527Energy / Nuclear safety / Organisation for Economic Co-operation and Development / Nuclear energy / Committee on the Safety of Nuclear Installations / Nuclear law / Nuclear Energy Agency / Nuclear power / Nuclear safety and security / Nuclear energy policy / Nuclear data

Nuclear Regulation NEA/CNRA/RDecember 2015 www.oecd-nea.org

Add to Reading List

Source URL: www.oecd-nea.org

Language: English - Date: 2015-12-18 09:38:24
528Information technology / Data security / Splunk / System administration / Computing / Infrastructure optimization

PROFESSIONAL SERVICES Enterprise Deployment — Large Professional Services Offering Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 23:54:36
529Information privacy / Computing / Internet privacy / Data security / Computer security / Privacy / HTTP cookie / Data Protection Act / Data protection (privacy) laws in Russia

Microsoft Word - armaniristorante_web_policy_en.docx

Add to Reading List

Source URL: s3-eu-west-1.amazonaws.com

Language: English - Date: 2016-08-03 05:41:20
530Defense Technical Information Center / Military science / National security / Military / Tat people / Critical infrastructure protection / Battlespace / Bio / IAC / Data & Analysis Center for Software / Cyber Security and Information Systems Information Analysis Center

DoD Information Analysis Centers (IAC) Multiple Award Contract (MAC) Government-Industry Day 16 Jun 2016 Source Selection Authority: Air Force PEO/CM

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2016-06-16 12:19:51
UPDATE