Torthaí cuardaigh
Topaicí molta laistigh de do chuardach.
Topaicí molta laistigh de do chuardach.
- Access control
- Computers 37
- Computer networks 25
- Security measures 25
- Computer security 23
- Government information 15
- Internet 14
- Medical records 14
- Privacy, Right of 12
- Government policy 11
- Law and legislation 11
- Freedom of information 10
- Censorship 8
- Data protection 8
- Public records 8
- Research 8
- Confidential communications 5
- Data processing 5
- Electronic information resources 5
- Information services 5
- Medical informatics 5
- Penetration testing (Computer security) 5
- Transparency in government 5
- Acces 4
- Contrôle 4
- Information technology 4
- Moral and ethical aspects 4
- Passwords 4
- Political aspects 4
- Records 4
-
1
Managing information security : a program for the electronic information age /
Foilsithe / Cruthaithe 1982LEABHAR -
2
Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /
Foilsithe / Cruthaithe 2006LEABHAR -
3
Access contested : security, identity, and resistance in Asian cyberspace /
Foilsithe / Cruthaithe 2012LEABHAR -
4
Check Point NG next generation security administration /
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
5
Access to research data in the 21st century an on going dialogue among interested parties : report of a workshop /
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
6
A question of balance private rights and the public interest in scientific and tecnhical databases /
Foilsithe / Cruthaithe 1999An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
7
For the record protecting electronic health information /
Foilsithe / Cruthaithe 1997An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
8
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
9
Building DMZs for Enterprise networks
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
10
Critical information infrastructure protection and the law an overview of key issues /
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
11
Security assessment case studies for implementing the NSA lAM /
Foilsithe / Cruthaithe 2004An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
12
Private lives and public policies confidentiality and accessibility of government statistics /
Foilsithe / Cruthaithe 1993An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
13
Health data in the information age use, disclosure, and privacy /
Foilsithe / Cruthaithe 1994An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
14
Getting started with HIPAA
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
15
Protecting data privacy in health services research
Foilsithe / Cruthaithe 2000An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
16
Proceedings of the workshop on promoting access to scientific and technical data for the public interest an assessment of policy options /
Foilsithe / Cruthaithe 1999An electronic book accessible through the World Wide Web; click to view
Leictreonach Imeacht comhdhála Ríomhleabhar -
17
Intrusion prevention and active response deploying network and host IPS /
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
18
Role-based access control
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
19
Outsourcing information security
Foilsithe / Cruthaithe 2004An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
20
User's guide to cryptography and standards
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar