Data security

Results: 28926



#Item
691Contract law / Data protection / Information privacy / Privacy / Safe harbor / Bundestag / Binding corporate rules / CDU/CSU / Law / Contract / Business

Press release (NOTE: This is a translated version, and as such, may contain unintended variancesThomas Jarzombek The digital economy needs legal security Transatlantic data traffic must also remain possibl

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2016-06-10 07:06:14
692Computing / Cloud infrastructure / Computer network security / Computer security / Cloudera / Hadoop / Threat / Big data / Cloud computing / Analytics

Cloudwick One® OSAS Cloud and Data Center Cybersecurity OPEN SOURCE ADAPTIVE SECURITY (OSAS) In today’s world of one data breach after another, enterprises are faced with a hostile information security environment. It

Add to Reading List

Source URL: www.cloudwick.com

Language: English
693Computing / Information technology management / Information technology / Network management / System administration / Computer security / Information privacy / Data security / Payment Card Industry Data Security Standard / Syslog / Log management / Information security

Standard: PCI Data Security Standard (PCI DSS) Version: 1.0 Date:

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-05-31 08:37:10
694Security / Surveillance / Prevention / Safety / Video / Physical security / Video management system / IP camera / NVR / Closed-circuit television / Computer data storage / Storage area network

Figure1_Basic Network Layout

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2014-09-30 05:38:09
695Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Data security / Computer security / Software / Certified Information Systems Security Professional / Information security

Microsoft PowerPoint - DenimGroup_PermanentCampaign_DenverISSA_20091021.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:59
696Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
697Business continuity and disaster recovery / Backup / Data security / Menu / Backup software / Software / ITunes / Computing / System software

C:uments and SettingsinDocumentsILESEWARE - instruction manual.wpd

Add to Reading List

Source URL: www.kscgroup.com

Language: English - Date: 2009-05-27 21:20:26
698ISO/IEC 11179 / Computing / Data / United States Department of Homeland Security / United States Department of Justice / Metadata registry / National Information Exchange Model / GJXDM

Interview with the GAC Chair and Vice Chair on the Global Highlights and Success During Their Leadership

Add to Reading List

Source URL: it.ojp.gov

Language: English - Date: 2009-11-02 12:09:38
699Microsoft / Webmail / Password / Security / Outlook.com

Physician Data Center (PDC) User Guide Updated July

Add to Reading List

Source URL: www.fsmb.org

Language: English - Date: 2016-07-13 11:10:17
700Data security / Prevention / Security / Identity management / Law / Privacy / Information privacy / Internet privacy / Information security / San Jose State University

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:31:43
UPDATE