Data security

Results: 28926



#Item
681Government / Federal assistance in the United States / Emergency management / United States Department of Homeland Security / Funding opportunity announcement / Federal Emergency Management Agency / Federal grants in the United States / Data Universal Numbering System / Grant / Homeland security / Homeland Security Grant Program / Homeland Security Appropriations Act

FY 2015 Homeland Security Grant Program

Add to Reading List

Source URL: wyohomelandsecurity.state.wy.us

Language: English - Date: 2015-10-15 16:26:44
682Passports / Radio-frequency identification / Security / National security / Government / United States nationality law / United States passport / Biometric passport / United States Passport Card / Russian passport / Indian passport / Canadian passport

APPLICATION FOR A U.S. PASSPORT NAME CHANGE, DATA CORRECTION, AND LIMITED PASSPORT BOOK REPLACEMENT PLEASE DETACH AND RETAIN THIS INSTRUCTION SHEET FOR YOUR RECORDS.

Add to Reading List

Source URL: www.ilw.com

Language: English - Date: 2012-09-10 14:50:57
683Prevention / Computer security / Safety / Security / Data security / Cryptography / Information security / National security / Policy / ISO/IEC 27001:2005 / Human resource policies

-Montana Operations Manual PROCEDURE TEMPLATE Category

Add to Reading List

Source URL: sitsd.mt.gov

Language: English - Date: 2016-04-18 15:42:55
684Privacy / Universal identifiers / Data security / Personal life / Personally identifiable information / Social Security number / Security / Euthenics / Government

California Bureau of Electronic and Appliance Repair, Home Furnishings and Thermal Insulation Application for Registration

Add to Reading List

Source URL: www.bearhfti.ca.gov

Language: English - Date: 2014-08-21 15:06:29
685Cryptography / Feistel cipher / Block cipher / Format-preserving encryption / Data Encryption Standard / ICE / Skipjack

On Generalized Feistel Networks Viet Tung Hoang and Phillip Rogaway Dept. of Computer Science, University of California, Davis, USA Abstract. We prove beyond-birthday-bound security for most of the well-known types of ge

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2010-12-10 03:09:04
686Computer security / Computing / Business continuity and disaster recovery / Security / Cyberwarfare / IT risk management / Backup / Data management / National Institute of Standards and Technology / Business continuity planning / Disaster recovery / Business continuity

1 Draft NIST Special Publication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-06 12:06:37
687Data security / System administration / Information technology management / Splunk / Information technology / Computer security / Payment Card Industry Data Security Standard

CASE STUDY Crossroads Foundation Gains Operational Visibility Into Mission-Critical Systems Industry • Nonprofit

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 06:36:02
688Computing / Privacy / Information / Data security / Data protection / Identity management / Internet privacy / Information privacy / Medical privacy / Open data / Personally identifiable information / Big data

Briefing Paper on Open Data and Privacy This paper is one of a series of four Briefing Papers on key issues in the use of open government data. The U.S. federal government, like many governments around the world, now rel

Add to Reading List

Source URL: www.opendataenterprise.org

Language: English - Date: 2016-08-19 00:49:50
689Computing / Security / Data management / Crime prevention / National security / Cloud storage / Computer networking / Data center / Telecommunications data retention / Privacy policy / Internet privacy / Database

Milestone MNA3.2: Requirements on data to protect from AAI, community, resource providers and e-infrastructure

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:15
690Computer security / Computing / Security / Data security / Cyberwarfare / Computer network security / ISO/IEC 27002 / Vulnerability / Information security management system / Security controls / Information security / ISO/IEC 27001:2013

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:59
UPDATE