Data security

Results: 28926



#Item
561Economy / Information privacy / Money / E-commerce / Business / Payment cards / Payment systems / Computer law / Payment Card Industry Data Security Standard / PA-DSS / Qualified Security Assessor / Payment card industry

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-04-24 19:15:12
562Business continuity and disaster recovery / Backup / Data security / Trust / Personal life / Behavior / Human behavior

CLIENT SUCCESS STORY CALIFORNIA-BASED WEALTH MANAGEMENT FIRM TRUSTS KeepItSafe TO PROTECT THEIR CRITICAL DATA The family wealth consulting group wishes all their relationships were as trustworthy and personal as the on

Add to Reading List

Source URL: www.keepitsafe.ca

Language: English - Date: 2016-08-18 06:15:35
563Computing / Data management / Communications protocol / Data transmission / Computer networking / Data / Computer security / Telecommunications engineering / Data center / Information security

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
564Computer security / Computing / Computer network security / Cyberwarfare / Security / Videotelephony / Data security / Integrated Services Digital Network / Network access / Security Target / Firewall / Oids

gsmyndigheten for IT-sikkerhet Norwegian Certificattion Authority for IT Security Sertifisering SERTIT T-012 MR Main ntena

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:40
565Business / Corporate governance / Management / Structure / Professional studies / Data security / Information Systems Security Association / Board of directors / Quorum / Public Interest Declassification Board / Military Order of the Dragon

BYLAWS OF THE CAPITOL OF TEXAS CHAPTER OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION, INC. ARTICLE I NAME

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-09-09 21:00:24
566Privacy / Law / Information privacy / Data security / Computing / Policy / Privacy policy / Internet privacy / Medical privacy / Data Protection Directive / Paul Hastings / Personally identifiable information

INTERNATIONAL PRIVACY POLICY Paul Hastings respects individual privacy and values the confidence of its employees, clients and business partners. In addition Processing Personal Information in a manner consistent with th

Add to Reading List

Source URL: www.paulhastings.com

Language: English - Date: 2016-08-09 19:32:05
567Economy / ECC / Department of Labor and Employment / Social Security / Insurance / Elliptic curve cryptography / Data Matrix

Add to Reading List

Source URL: ecc.gov.ph

Language: English - Date: 2016-01-13 01:39:23
568Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
569Prevention / Computer security / Safety / Security / Data security / Data Quality Act / Information security / Privacy / National Oceanic and Atmospheric Administration

Department of Commerce $ National Oceanic & Atmospheric Administration $ National Marine Fisheries Service

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-09-02 12:10:03
570Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
UPDATE