Protected computer

Results: 695



#Item
351Cryptography standards / Computer security / Electronic engineering / Wireless networking / Cisco Catalyst / Wireless security / Cisco IOS / IEEE 802.11i-2004 / Wi-Fi Protected Access / Computer network security / Computing / Cryptographic protocols

FIPS[removed]Security Policy for Cisco Catalyst 6506, 6506-E, 6509, and 6509-E Switches with Wireless Services Modules (WiSMs) This security policy contains these sections: •

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
352Computing / IEEE 802.11 / Technology / Cryptography / Wireless security / IEEE 802.11i-2004 / Wired Equivalent Privacy / Wi-Fi Protected Access / Wireless access point / Computer network security / Cryptographic protocols / Wireless networking

Boeing Wireless LAN Security Architecture Design Proposal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-04 01:00:00
353Wireless / Electronic engineering / Wireless security / Wi-Fi / Service set / Wireless access point / Cracking of wireless networks / Wi-Fi Protected Access / Wireless networking / Computer network security / Technology

fort_mac_security_wireless.ppt

Add to Reading List

Source URL: www.fortmac.org

Language: English - Date: 2013-04-19 11:23:56
354Solid-state drive / Computer data storage / Memristor / Dynamic random-access memory / Non-volatile memory / Random-access memory / Flash memory / Hybrid drive / Computer memory / Computer hardware / Computing

A Protected Block Device for Persistent Memory Feng Chen Computer Science & Engineering Louisiana State University

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:51:06
355Computer network security / Technology / Cryptographic protocols / Wireless / Routing / Ifconfig / Wi-Fi Protected Access / Wi-Fi / Wireless LAN / Wireless networking / Computing / IEEE 802.11

WIRELESS NETWORKS MADE EASY It is rather tempting to say that on BSD, and OpenBSD in particular, there’s no need to “make wireless networking easy,”

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2012-02-08 15:24:21
356Data security / Security / Law / Health / Health Insurance Portability and Accountability Act / Patient Safety and Quality Improvement Act / Protected health information / Privacy law / Computer security

45 CFR[removed]Privacy Rule) Requirements Research Authorizations for Use or Disclosure of Protected Health Information Definitions: Protected Health Information (PHI) means individually identifiable health information

Add to Reading List

Source URL: dshs.wa.gov

Language: English - Date: 2012-12-17 18:08:48
357Computer security / Cyberwarfare / Secure communication / Personal life / Personally identifiable information / Health Insurance Portability and Accountability Act / Information security / Protected health information / Cryptography / Security / Data security / Computer network security

Responsible University Officer Chief Information Officer Responsible Office Information Technology Services Transmission of Protected Health Information and Personal

Add to Reading List

Source URL: its.unc.edu

Language: English - Date: 2014-08-14 10:38:44
358Health Insurance Portability and Accountability Act / Protected health information / Medical record / Healthcare Information and Management Systems Society / Computer data storage / Health informatics / Medical informatics / Health / Medicine

Presentation to the IEEE Engineering in Medicine and Biology Society (EMBS) Annual International Conference San Francisco, CA HIPAA Security Rule and its

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:33:24
359National security / Government / Computing / Data privacy / Information sensitivity / Protected health information / Information security / Credit card / Health Insurance Portability and Accountability Act / Security / Computer security / Data security

UL Lafayette Guideline Classification of Data Use these criteria to determine which data classification is appropriate for a particular information or infrastructure system. A positive response to the highest category in

Add to Reading List

Source URL: helpdesk.louisiana.edu

Language: English - Date: 2013-07-29 15:18:05
360Law / Data security / Health / Privacy law / Health Insurance Portability and Accountability Act / Medical informatics / Protected health information / Data breach / Regulatory compliance / Security / Data privacy / Computer security

Health Care Information Privacy The HIPAA Regulations – What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection issues

Add to Reading List

Source URL: ncra.files.cms-plus.com

Language: English - Date: 2014-01-07 17:06:08
UPDATE