Data security

Results: 28926



#Item
701Password / Security / Prevention / Computer security / Mainframe computer / Resource Access Control Facility / Z/OS / Identity management / Computing / Password manager / Password fatigue

Data Sheet Automated Sign-On for Mainframe Add-On for Host Access Management and Security Server Automated Sign-On for Mainframe Add-On

Add to Reading List

Source URL: www.attachmate.com

Language: English - Date: 2016-06-20 22:27:35
702Computing / Information technology / Data / Information systems / Information technology management / Records management technology / United States Department of Homeland Security / United States Department of Justice / Document management system / National Information Exchange Model / Database / Decision support system

aiSMARTBENCH™ Decision Support System Inspired by Judges, for Judges The First Decision Support System for Judges What Is a Decision Support System?

Add to Reading List

Source URL: www.mentistechnology.com

Language: English - Date: 2016-05-18 18:51:21
703Computing / Cloud computing / Cloud infrastructure / Cloud storage / File hosting service / Data security / Advanced Encryption Standard / Cloud computing security / IEEE Cloud Computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:45
704Prevention / Computer security / Security / Safety / Data security / Information privacy / Cryptography / Payment Card Industry Data Security Standard / Information security / Health Insurance Portability and Accountability Act / IT risk

Microsoft Word - original policy template.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-11-12 13:54:45
705Cryptography / Key management / Applied mathematics / Cryptographic software / Symmetric-key algorithm / Cipher / Key size / Block cipher / Key / Public-key cryptography / Encryption / Data Encryption Standard

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
706Mass surveillance / National security / Security / Surveillance / Investigatory Powers Bill / Investigatory Powers Tribunal / Telecommunications data retention / Data retention / Bulk personal datasets / Personally identifiable information / Mass surveillance in the United Kingdom / Telecommunications (Interception and Access) Amendment (Data Retention) Act

Call for Written Evidence

Add to Reading List

Source URL: www.parliament.uk

Language: English - Date: 2015-11-27 07:26:47
707Privacy / Data security / Computing / Data protection / Identity documents / Government / Identity management / Internet privacy / Privacy policy / Password / Information privacy / Medical privacy

Disclaimer & Privacy Important Information By accessing and using this website (the “Website”) and any web page hereof, you agree to be bound by the terms and conditions below. Reference to these general terms of use

Add to Reading List

Source URL: phillipfunds.com

Language: English - Date: 2015-10-15 08:31:29
708Internet privacy / Hypertext Transfer Protocol / Computer access control / Computing / Computer security / HTTP cookie / World Wide Web / Session / Login / Zombie cookie / Cookie / Evercookie

Cookies To make this site work properly, we sometimes place small data files called cookies on your device. Most big websites do this too. What are cookies? A cookie is a small text file that a website saves on your comp

Add to Reading List

Source URL: mainwlp.efrontcloud.com

Language: English - Date: 2015-11-26 08:17:26
709Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Computer security / SafeNet / Anthem medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE SECOND QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
710Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
UPDATE