Storage security

Results: 1909



#Item
781Computer storage / Data security / Data management / Data remanence / Data erasure / Computer data / Degaussing / Disk formatting / File deletion / Information / Computing / Data

  Information Security Animations - Secure Deletion (Script) Secure Deletion Secure deletion is a method of data deletion by which deleted information can not be recovered. It is

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:42
782Data synchronization / Cloud storage / File hosting / Online backup services / Cloud applications / Dropbox / Evernote / Android / SugarSync / Software / Computing / Cloud computing

Microsoft PowerPoint - 6. Sang Young_Cloud Computing Security (End User).ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-12-14 03:25:08
783Data synchronization / Cloud storage / File hosting / Online backup services / Cloud applications / Dropbox / Evernote / Android / SugarSync / Software / Computing / Cloud computing

Microsoft PowerPoint - 6. Sang Young_Cloud Computing Security (End User).ppt

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-12-14 03:25:09
784Information / Computer storage / Storage media / Compact Disc / Data remanence / USB flash drive / Degaussing / Backup / Sanitization / Information science / Data security / Computing

Microsoft Word - Sanitizing Media July[removed]Final.doc

Add to Reading List

Source URL: www.sro.wa.gov.au

Language: English - Date: 2011-09-02 01:23:37
785Crime prevention / National security / Information technology management / Computer storage media / Portable storage device / Password / Information privacy / Backup / Computer security / Ethics / Security / Data security

Guidance Note Guidance on the Use of Portable Storage Devices Introduction Portable storage devices (“PSDs”) such as USB

Add to Reading List

Source URL: www.pcpd.org.hk

Language: English - Date: 2015-01-06 02:10:02
786Universal Serial Bus / Cyberwarfare / End point security / Check Point / Computer network security / Security / Computer security

  Information Security Animations - Endpoint Security (Script) Endpoint Security An endpoint device generally refers to any electronic device with information storage capability and is

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-02-24 20:59:08
787Technology / Business law / Supply chain management / Manufacturing / Logistics / Self storage / Pawnbroker / Lien / Security interest / Business / Law / Property law

032 – Self Storage Association of Australasia

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-12-22 17:46:35
788File sharing networks / Intellectual property law / Distributed data storage / Peer-to-peer computing / File sharing / Peer-to-peer / HTTP / Social peer-to-peer processes / Share / Computing / Concurrent computing / Distributed computing

  Information Security Animations - Peer-to-peer ( P2P) Network (Script) What is Peer-to-peer ( P2P) Network? Peer-to-peer (P2P) network is a non-traditional network model.

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:37
789Cloud storage / Cloud computing / Centralized computing / Computing

Information Security Animations – Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company’s staff, Ken, is opening the office’s door)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-11-23 22:00:27
790Administration / Information technology management / Records management / Information security / Business / Database / Data management / Computer security / Security / Data security

State Records Guideline No 13 Certification for secondary storage providers

Add to Reading List

Source URL: www.linc.tas.gov.au

Language: English - Date: 2014-11-27 22:09:24
UPDATE