Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Data protection
- Access control 7
- Computer security 4
- Law and legislation 4
- Privacy, Right of 4
- Medical records 3
- COMPUTERS / Security / General 2
- Computer networks 2
- Information services 2
- Records 2
- Security measures 2
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Information Technology 1
- Clinical trials 1
- Cloud computing 1
- Data processing 1
- Electronic records 1
- Financial institutions 1
- Government information 1
- Government policy 1
- Information storage and retrieval systems 1
- Information superhighway 1
- Internet 1
- Library legislation 1
- Medical care 1
- Public records 1
- Research 1
- Teleshopping 1
-
1
For the record protecting electronic health information /
Published 1997Subjects: “…Medical records Access control United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
Digital privacy in the marketplace : perspectives on the information exchange /
Published 2015Subjects: “…Internet Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Getting started with HIPAA
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
The digital person technology and privacy in the information age /
Published 2004Subjects: “…Electronic records Access control United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Information sellers and resellers
Published 2009Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Information privacy fundamentals for librarians and information professionals /
Published 2015Subjects: “…Records Access control United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
9
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook