Information security

Results: 50180



#Item
901Computing / Security / Cloud computing / Cloud infrastructure / Computer security / Cryptography / National security / Cloud computing security / Information security / Cloud computing issues / Cloud broker

Security for Cloud Computing: 10 Steps to Ensure Success http://www.cloud-council.org/resource-hub.htm#security-for-cloud-computing-10steps-to-ensure-success March, 2015 The Cloud Standards Customer Council

Add to Reading List

Source URL: www.cloud-council.org

Language: English - Date: 2016-08-12 16:58:13
902Universal identifiers / Taxation in the United States / Contract law / Economy / Internal Revenue Service / Privacy / Law / Taxpayer Identification Number / Social Security number / Language / Employer Identification Number / Personally identifiable information

APPLICATION FOR REGISTRATION

Add to Reading List

Source URL: www.bearhfti.ca.gov

Language: English - Date: 2015-09-25 15:26:25
903Business / Corporate governance / Management / Structure / Professional studies / Data security / Information Systems Security Association / Board of directors / Quorum / Public Interest Declassification Board / Military Order of the Dragon

BYLAWS OF THE CAPITOL OF TEXAS CHAPTER OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION, INC. ARTICLE I NAME

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-09-09 21:00:24
904Privacy / Law / Information privacy / Data security / Computing / Policy / Privacy policy / Internet privacy / Medical privacy / Data Protection Directive / Paul Hastings / Personally identifiable information

INTERNATIONAL PRIVACY POLICY Paul Hastings respects individual privacy and values the confidence of its employees, clients and business partners. In addition Processing Personal Information in a manner consistent with th

Add to Reading List

Source URL: www.paulhastings.com

Language: English - Date: 2016-08-09 19:32:05
905Cryptography / Public-key cryptography / E-commerce / Public key infrastructure / Key management / Computer security / Public key certificate / SOA Security

information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:18:27
906Prevention / Computer security / Safety / Security / Data security / Data Quality Act / Information security / Privacy / National Oceanic and Atmospheric Administration

Department of Commerce $ National Oceanic & Atmospheric Administration $ National Marine Fisheries Service

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-09-02 12:10:03
907Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
908Security / Prevention / Computing / Data security / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy / HTTP cookie / Information security

UMKC SHORT TERM LOAN - TERMS AND CONDITIONS

Add to Reading List

Source URL: www.sfa.umkc.edu

Language: English - Date: 2006-06-12 18:44:50
909Information technology management / Corporate Governance of ICT / Information technology governance / Information and communication technologies for development / Information and communications technology / Computing / Ministry of Communications and Information Technology / Draft:ICT Security Policy System: A Case Study

Organizational Unit Functions of the Division National ICT Governance – Policies and Standards Development (PSD) 1. Manage the development/updating, adoption, implementation and

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:58
910Data security / Data management / Privacy / Identity management / Computing / Medical privacy / Internet privacy / Personally identifiable information / Personal /  Inc. / Information technology

CASE STUDY Mydex enables individuals to exchange personal data with Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-04-22 08:00:52
UPDATE