Search Results - "access control"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    For the record protecting electronic health information /

    Published 1997
    Subjects: “…Medical records Access control United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2
  3. 3

    Digital privacy in the marketplace : perspectives on the information exchange / by Milne, George R.

    Published 2015
    Subjects: “…Internet Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Getting started with HIPAA by Pabrai, Uday O.

    Published 2003
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    The digital person technology and privacy in the information age / by Solove, Daniel J., 1972-

    Published 2004
    Subjects: “…Electronic records Access control United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Information sellers and resellers

    Published 2009
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Information privacy fundamentals for librarians and information professionals / by Givens, Cherie L., 1969-

    Published 2015
    Subjects: “…Records Access control United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  9. 9

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook