Information security

Results: 50180



#Item
141

IN THE SPOTLIGHT Program 161 – Information and Communication Technology 2018 Research Portfolio is now available. Program 183 – Cyber Security 2018 Research Portfolio is now available.

Add to Reading List

Source URL: smartgrid.epri.com

Language: English - Date: 2018-04-23 15:23:28
    142

    Domestic Violence and Identity Theft What is Identity Theft? Identity theft is when someone takes a person’s identifying information – like their Social Security number, credit card data, or other confidential or sen

    Add to Reading List

    Source URL: opdv.ny.gov

    Language: English - Date: 2018-06-05 10:50:49
      143

      FOR IMMEDIATE RELEASE HIPAA Breach Notification September 1, 2017 ANCHORAGE - The Alaska Department of Health and Social Services had a security breach that may have disclosed personal information of individuals who hav

      Add to Reading List

      Source URL: dhss.alaska.gov

      Language: English - Date: 2018-06-28 18:02:10
        144

        Form DC-495 PETITION FOR INJUNCTION OR MANDAMUS – Page: 1 FREEDOM OF INFORMATION ACT AND AFFIDAVIT FOR GOOD CAUSE OR PROTECTION OF SOCIAL SECURITY NUMBERS ACT

        Add to Reading List

        Source URL: www.courts.state.va.us

        Language: English - Date: 2009-08-14 16:14:23
          145

          Formulae for Arithmetic on Genus 2 Hyperelliptic Curves Tanja Lange Information-Security and Cryptography, Ruhr-University of Bochum, Universit¨atsstr. 150, 44780 Bochum, Germany,

          Add to Reading List

          Source URL: hyperelliptic.org

          Language: English - Date: 2006-06-28 17:20:14
            146

            Job Applicant Privacy Notice As part of any recruitment process, atsec information security AB collects and processes personal data relating to job applicants. The organisation is committed to being transparent about how

            Add to Reading List

            Source URL: www.atsec.se

            Language: English
              147

              Cryptanalysis of a Pay-As-You-Watch System [Published in Information Processing Letters 88(3):119–120, Marc Joye Gemplus S.A., Card Security Group La Vigie, Avenue du Jujubier, ZI Ath´elia IV, 13705 La Ciotat C

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:43:43
                148

                Page 1 of 5 F.C.A. § § 522, 523, S.S.L. § 111-g [Note: Nassau County Family Court (NCFC) Information Sheets containing the Social Security #’s of the parties and the dependents must be filed with this petition]

                Add to Reading List

                Source URL: www.nycourts.gov

                Language: English - Date: 2015-05-04 09:38:46
                  149

                  Regulation SBSR—Reporting and Dissemination of Security-Based Swap Information; Final Rule

                  Add to Reading List

                  Source URL: www.sec.gov

                  Language: English - Date: 2016-08-22 16:24:34
                    150

                    COMPLIANCE AUTOMATION BRIDGING THE GAP BETWEEN DEVELOPMENT AND INFORMATION SECURITY Published January, 2018

                    Add to Reading List

                    Source URL: pages.chef.io

                    Language: English - Date: 2018-07-13 16:05:11
                      UPDATE