Suchergebnisse

  1. 1

    Managing information security : a program for the electronic information age / von Schweitzer, James A., 1929-

    Veröffentlicht 1982
    Buch
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Veröffentlicht 2006
    Buch
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    Veröffentlicht 2012
    Buch
  4. 4

    Check Point NG next generation security administration /

    Veröffentlicht 2002
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  5. 5
  6. 6
  7. 7

    For the record protecting electronic health information /

    Veröffentlicht 1997
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    Veröffentlicht 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  10. 10
  11. 11

    Security assessment case studies for implementing the NSA lAM / von Rogers, Russ

    Veröffentlicht 2004
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  12. 12
  13. 13

    Health data in the information age use, disclosure, and privacy /

    Veröffentlicht 1994
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  14. 14

    Getting started with HIPAA von Pabrai, Uday O.

    Veröffentlicht 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  15. 15

    Protecting data privacy in health services research

    Veröffentlicht 2000
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  16. 16
  17. 17
  18. 18

    Role-based access control von Ferraiolo, David

    Veröffentlicht 2003
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  19. 19

    Outsourcing information security von Axelrod, C. Warren

    Veröffentlicht 2004
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book
  20. 20

    User's guide to cryptography and standards von Dent, Alexander W.

    Veröffentlicht 2005
    An electronic book accessible through the World Wide Web; click to view
    Elektronisch E-Book