Resultados da pesquisa
Sugestões de Tópicos dentro de sua pesquisa.
Sugestões de Tópicos dentro de sua pesquisa.
- Access control
- Computers 75
- Computer networks 50
- Security measures 50
- Computer security 46
- Government information 30
- Internet 29
- Medical records 28
- Privacy, Right of 24
- Government policy 22
- Law and legislation 22
- Freedom of information 21
- Censorship 17
- Data protection 16
- Public records 16
- Research 16
- Confidential communications 10
- Data processing 10
- Electronic information resources 10
- Information services 10
- Medical informatics 10
- Penetration testing (Computer security) 10
- Transparency in government 10
- Political aspects 9
- Acces 8
- Contrôle 8
- Information technology 8
- Moral and ethical aspects 8
- Passwords 8
- Records 8
-
1
Managing information security : a program for the electronic information age /
Publicado em 1982Livro -
2
-
3
-
4
Check Point NG next generation security administration /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
5
Access to research data in the 21st century an on going dialogue among interested parties : report of a workshop /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
6
A question of balance private rights and the public interest in scientific and tecnhical databases /
Publicado em 1999An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
7
For the record protecting electronic health information /
Publicado em 1997An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
8
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
Publicado em 2002An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
9
Building DMZs for Enterprise networks
Publicado em 2003An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
10
Critical information infrastructure protection and the law an overview of key issues /
Publicado em 2003An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
11
Security assessment case studies for implementing the NSA lAM /
Publicado em 2004An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
12
Private lives and public policies confidentiality and accessibility of government statistics /
Publicado em 1993An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
13
Health data in the information age use, disclosure, and privacy /
Publicado em 1994An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
14
Getting started with HIPAA
Publicado em 2003An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
15
Protecting data privacy in health services research
Publicado em 2000An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
16
Proceedings of the workshop on promoting access to scientific and technical data for the public interest an assessment of policy options /
Publicado em 1999An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico Conference Proceeding livro electrónico -
17
Intrusion prevention and active response deploying network and host IPS /
Publicado em 2005An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
18
Role-based access control
Publicado em 2003An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
19
Outsourcing information security
Publicado em 2004An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico -
20
User's guide to cryptography and standards
Publicado em 2005An electronic book accessible through the World Wide Web; click to view
Recurso Electrónico livro electrónico