Search Results - *
Suggested Topics within your search.
Suggested Topics within your search.
- Access control
- Computers 38
- Computer networks 25
- Security measures 24
- Computer security 23
- Government information 15
- Internet 14
- Medical records 14
- Law and legislation 12
- Government policy 11
- Privacy, Right of 11
- Freedom of information 10
- Censorship 8
- Public records 8
- Research 8
- Data protection 7
- Confidential communications 5
- Data processing 5
- Electronic information resources 5
- Information services 5
- Medical informatics 5
- Moral and ethical aspects 5
- Penetration testing (Computer security) 5
- Transparency in government 5
- Acces 4
- Contrôle 4
- Data encryption (Computer science) 4
- Information technology 4
- Management 4
- Passwords 4
-
1
-
2
-
3
-
4
Check Point NG next generation security administration /
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
-
6
-
7
For the record protecting electronic health information /
Published 1997An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
-
9
Building DMZs for Enterprise networks
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
-
11
-
12
-
13
-
14
Getting started with HIPAA
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Protecting data privacy in health services research
Published 2000An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Proceedings of the workshop on promoting access to scientific and technical data for the public interest an assessment of policy options /
Published 1999An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
17
-
18
Role-based access control
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Outsourcing information security
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
User's guide to cryptography and standards
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook