Risultati della ricerca

  1. 1

    Managing information security : a program for the electronic information age / di Schweitzer, James A., 1929-

    Pubblicazione 1982
    Libro
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Pubblicazione 2006
    Libro
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    Pubblicazione 2012
    Libro
  4. 4

    Check Point NG next generation security administration /

    Pubblicazione 2002
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  5. 5
  6. 6
  7. 7

    For the record protecting electronic health information /

    Pubblicazione 1997
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    Pubblicazione 2003
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  10. 10
  11. 11

    Security assessment case studies for implementing the NSA lAM / di Rogers, Russ

    Pubblicazione 2004
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  12. 12
  13. 13

    Health data in the information age use, disclosure, and privacy /

    Pubblicazione 1994
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  14. 14

    Getting started with HIPAA di Pabrai, Uday O.

    Pubblicazione 2003
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  15. 15

    Protecting data privacy in health services research

    Pubblicazione 2000
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  16. 16
  17. 17
  18. 18

    Role-based access control di Ferraiolo, David

    Pubblicazione 2003
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  19. 19

    Outsourcing information security di Axelrod, C. Warren

    Pubblicazione 2004
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook
  20. 20

    User's guide to cryptography and standards di Dent, Alexander W.

    Pubblicazione 2005
    An electronic book accessible through the World Wide Web; click to view
    Elettronico eBook