Data security

Results: 28926



#Item
821E-commerce / Computer network security / MySQL / Cross-platform software / Oracle Database / Oracle Corporation / Payment Card Industry Data Security Standard / Computer security / Wireless security / Database / WareValley / Database activity monitoring

Agenda Track 1 (MySQL) SOUG June:00 – 13:45 Oracle Standard Edition 2 – alles ändert sich?

Add to Reading List

Source URL: www.soug.ch

Language: English - Date: 2016-07-07 08:35:25
822Mobile computers / Wearable computers / Ubiquitous computing / Citizen science / Lifelog / Personal digital assistants / Bluetooth / Internet privacy / DARPA LifeLog / Personal /  Inc. / Cathal Gurrin / Computer security

Visualising the Past: Annotating a Life with Linked Open Data Ashley Smith Kieron O’Hara

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:54:41
823Computer security / Crime prevention / Cryptography / Data security / Information security / National security

ROSSENDALES LIMITED ROSSENDALES COLLECT LIMITED NNDR Recovery & Enforcement Course Outline DOCUMENT NO : TRE1DOCUMENT DATE:

Add to Reading List

Source URL: www.rossendalestraining.com

Language: English - Date: 2013-01-29 11:08:31
824Data management / Data security / Personal /  Inc.

I. Go to http://admissions.oia.ncu.edu.tw/ II.

Add to Reading List

Source URL: admissions.oia.ncu.edu.tw

Language: English - Date: 2015-09-30 02:05:51
825Federal Emergency Management Agency / Identity documents / Data security / Emergency management / United States Department of Homeland Security / Personally identifiable information

U.S. Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA), National Preparedness Directorate (NPD), National Integration Center (NIC), Training and Exercise Integration Secretariat/Training O

Add to Reading List

Source URL: www.ctosnnsa.org

Language: English - Date: 2015-09-09 18:29:25
826Data security / Splunk / System administration / Infrastructure optimization

PROFESSIONAL SERVICES Enterprise Deployment — Small Professional Services Offering Overview

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 12:57:10
827Privacy / Identity documents / Identity management / Data security / Personal life / Personally identifiable information / Internet privacy / Privacy policy / Medical privacy / Privacy Office of the U.S. Department of Homeland Security / P3P

DRIVINGLOYALTY.COM, LLC PRIVACY POLICY Updated: July 15, 2016 DrivingLoyalty.com, LLC and our affiliates (“Company”, “us” or “we”) have adopted this Privacy Policy, which applies to all users of our website w

Add to Reading List

Source URL: drivingloyalty.com

Language: English - Date: 2016-07-13 10:13:11
828Health informatics / Health Insurance Portability and Accountability Act / Electronic health records / Medical privacy / Medical record / Privacy / Telepsychiatry / Information privacy law

Security Watch Rebecca T. Mercuri The HIPAA-potamus in Health Care Data Security

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 17:32:35
829Payment systems / E-commerce / Information privacy / Payment cards / Merchant services / Payment Card Industry Data Security Standard / PA-DSS / Payment card industry / Qualified Security Assessor / SAQ / Credit card / Acquiring bank

Payment Card Industry Data Security Standard Self-Assessment Questionnaire A Guide PCI DSS Version: V3.1, Rev 1.1

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-04-27 15:52:09
830Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
UPDATE