Information security

Results: 50180



#Item
91Workbooks Online Limited Security Policy Workbooks’ objective is to preserve the confidentiality, integrity and availability of information that it either owns or is entrusted with. To achieve these objectives, the com

Workbooks Online Limited Security Policy Workbooks’ objective is to preserve the confidentiality, integrity and availability of information that it either owns or is entrusted with. To achieve these objectives, the com

Add to Reading List

Source URL: www.workbooks.com

Language: English - Date: 2018-05-24 05:54:58
    922  1. INFORMATION ON THE RULES OF CONDUCT ON RAILWAYS IN RUSSIA. ..3 Basic security requirements and restrictions ............................................................................3

    2 1. INFORMATION ON THE RULES OF CONDUCT ON RAILWAYS IN RUSSIA. ..3 Basic security requirements and restrictions ............................................................................3

    Add to Reading List

    Source URL: www.norway.mid.ru

    Language: English - Date: 2018-02-08 02:01:28
      93Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

      Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

      Add to Reading List

      Source URL: epic.org

      Language: English - Date: 2016-02-22 14:56:38
        94CRYPTOGRAPHY IN ITSEF Journée Codage & Cryptographie 2017 | Cécile Dumas | 24 avril 2017 FRENCH CERTIFICATION SCHEME ITSEF Information Technology Security Evaluation Facility CESTI Centre d’Évaluation de la Sécuri

        CRYPTOGRAPHY IN ITSEF Journée Codage & Cryptographie 2017 | Cécile Dumas | 24 avril 2017 FRENCH CERTIFICATION SCHEME ITSEF Information Technology Security Evaluation Facility CESTI Centre d’Évaluation de la Sécuri

        Add to Reading List

        Source URL: jc2-2017.inria.fr

        Language: English - Date: 2017-05-24 09:05:19
          95A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information Reena Singh and Timothy A. Gonsalves Indian Institute of Technology, Mandi

          A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information Reena Singh and Timothy A. Gonsalves Indian Institute of Technology, Mandi

          Add to Reading List

          Source URL: tinytocs.ece.utexas.edu

          Language: English - Date: 2016-03-05 17:06:25
            96IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

            IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

            Add to Reading List

            Source URL: users.encs.concordia.ca

            Language: English - Date: 2013-08-05 10:55:12
              97ITS POLICIES AND GUIDELINES CATEGORY: Security, Privacy, Information Access & Management STATUS: Approved

              ITS POLICIES AND GUIDELINES CATEGORY: Security, Privacy, Information Access & Management STATUS: Approved

              Add to Reading List

              Source URL: its.truman.edu

              Language: English - Date: 2015-09-04 15:23:09
                98A Process for the Sharing of Information as to States’ Implementation of the Code of Conduct on the Safety and Security of Radioactive Sources and its associated Guidance on the Import and Export of Radioactive Sources

                A Process for the Sharing of Information as to States’ Implementation of the Code of Conduct on the Safety and Security of Radioactive Sources and its associated Guidance on the Import and Export of Radioactive Sources

                Add to Reading List

                Source URL: www-ns.iaea.org

                Language: English - Date: 2017-07-18 11:36:22
                  99A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

                  A Statistical Property of Wireless Channel Capacity Fengyou Sun, Yuming Jiang Department of Information Security and Communication Technology NTNU – Norwegian University of Science and Technology Trondheim, Norway

                  Add to Reading List

                  Source URL: disco.cs.uni-kl.de

                  Language: English - Date: 2018-03-05 21:39:26
                    100Flood Awareness Month – PODCAST 14: Preparing for Floods RUN TIME: 4 MIN, 12 SECONDS Stefanie Bond, Public Information Officer Iowa Homeland Security and Emergency Management Division  Lucinda Robertson, Public Informa

                    Flood Awareness Month – PODCAST 14: Preparing for Floods RUN TIME: 4 MIN, 12 SECONDS Stefanie Bond, Public Information Officer Iowa Homeland Security and Emergency Management Division Lucinda Robertson, Public Informa

                    Add to Reading List

                    Source URL: www.beready.iowa.gov

                    Language: English - Date: 2012-02-24 11:09:52