Torthaí cuardaigh

  1. 1

    Managing information security : a program for the electronic information age / de réir Schweitzer, James A., 1929-

    Foilsithe / Cruthaithe 1982
    LEABHAR
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Foilsithe / Cruthaithe 2006
    LEABHAR
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    Foilsithe / Cruthaithe 2012
    LEABHAR
  4. 4

    Check Point NG next generation security administration /

    Foilsithe / Cruthaithe 2002
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  5. 5
  6. 6
  7. 7

    For the record protecting electronic health information /

    Foilsithe / Cruthaithe 1997
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  10. 10
  11. 11

    Security assessment case studies for implementing the NSA lAM / de réir Rogers, Russ

    Foilsithe / Cruthaithe 2004
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  12. 12
  13. 13

    Health data in the information age use, disclosure, and privacy /

    Foilsithe / Cruthaithe 1994
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  14. 14

    Getting started with HIPAA de réir Pabrai, Uday O.

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  15. 15

    Protecting data privacy in health services research

    Foilsithe / Cruthaithe 2000
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  16. 16
  17. 17

    Intrusion prevention and active response deploying network and host IPS / de réir Rash, Michael

    Foilsithe / Cruthaithe 2005
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  18. 18

    Role-based access control de réir Ferraiolo, David

    Foilsithe / Cruthaithe 2003
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  19. 19

    Outsourcing information security de réir Axelrod, C. Warren

    Foilsithe / Cruthaithe 2004
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar
  20. 20

    User's guide to cryptography and standards de réir Dent, Alexander W.

    Foilsithe / Cruthaithe 2005
    An electronic book accessible through the World Wide Web; click to view
    Leictreonach Ríomhleabhar