Data security

Results: 28926



#Item
591Computer security / Computer network security / Security / Cyberwarfare / Data security / Cybercrime / Cryptography / Password / Firewall / Network security / Operating system / Password policy

Introduction to Intrusion Protection and Network Security Jennifer Vesperman

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2002-03-20 10:00:48
592Identity management / Data security / Law / Privacy / Neelie Kroes / Computing / Personal /  Inc. / Medical privacy / Information technology / Politics of the Netherlands / Fraunhofer Institute for Open Communication Systems

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
593European Union law / Security / Law / Information privacy / European Union directives / Data security / Privacy / Data Protection Directive / Telecommunications data retention / Security breach notification laws / Personally identifiable information / Data breach

WP29 opinionon e-privacy directive

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-08-12 12:28:12
594Computing / Backup software / Data security / Business continuity and disaster recovery / Cloud storage / Backup / Computer data storage / Cloud infrastructure / Remote backup service / Asigra / Cloud computing / Oracle Database

Case Study Highstreet IT Solutions Confidently Expands into Cloud Services with Asigra Data Protection

Add to Reading List

Source URL: www.asigra.com

Language: English - Date: 2016-06-29 17:35:22
595Cyberwarfare / Computer network security / Security / Computing / Denial-of-service attacks / Internet Relay Chat / Denial-of-service attack / Security appliance / Computer security / Unified threat management / Draft:Corero Network Security

SmartWall® THREAT DEFENSE SYSTEM DATA SHEET

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2016-02-01 14:49:53
596Sustainable urban planning / Economics / Internet of Things / Energy / Emerging technologies / Electric power / Economic development / Public policy / Smart city / Smart meter / Smart Nation / Smart system

CREATe Working PaperDecemberPrivacy, Security and Data Protection in Smart Cities: a Critical EU Law Perspective Author

Add to Reading List

Source URL: zenodo.org

Language: English - Date: 2015-12-03 04:34:33
597Privacy / Data security / Personal life / Personally identifiable information / Email / Travel visa / Address / Mail / Internet privacy / Anthropology / Computing / Humanities

University of California, Irvine ACADEMIC — PERSONAL DATA SHEET

Add to Reading List

Source URL: www.ap.uci.edu

Language: English - Date: 2012-11-16 18:56:09
598Computer security / Security / Prevention / Data security / Crime prevention / Cryptography / National security / Health Insurance Portability and Accountability Act / Information security / Vulnerability / Security management / Security controls

Security HIPAA Security Topics 1.

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
599Computing / Computer networking / Data management / Network architecture / Cloud storage / Data center / Distributed data storage / Software-defined networking / Cloud computing / Computer security / Application Defined Network

Research Statement for Theophilus Benson The average enterprise network operator is responsible for managing a network that secures $5 billion worth of intellectual property (McAfeeand whose poor performance can r

Add to Reading List

Source URL: users.cs.duke.edu

Language: English - Date: 2014-03-19 22:40:33
600Health informatics / Health / Computer security / Data security / Security / Health information exchange / Integrating the Healthcare Enterprise / Information security / Medical privacy / Privacy / Health Insurance Portability and Accountability Act / Security controls

Integrating the Healthcare Enterprise 5 10

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2008-10-24 17:11:46
UPDATE