Resultados da pesquisa

Refinar resultados
  1. 1

    Managing information security : a program for the electronic information age / Por Schweitzer, James A., 1929-

    Publicado em 1982
    Livro
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Publicado em 2006
    Livro
  3. 3

    Access contested : security, identity, and resistance in Asian cyberspace /

    Publicado em 2012
    Livro
  4. 4

    Check Point NG next generation security administration /

    Publicado em 2002
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  5. 5
  6. 6
  7. 7

    For the record protecting electronic health information /

    Publicado em 1997
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  8. 8
  9. 9

    Building DMZs for Enterprise networks

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  10. 10

    Critical information infrastructure protection and the law an overview of key issues /

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  11. 11

    Security assessment case studies for implementing the NSA lAM / Por Rogers, Russ

    Publicado em 2004
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  12. 12
  13. 13

    Health data in the information age use, disclosure, and privacy /

    Publicado em 1994
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  14. 14

    Getting started with HIPAA Por Pabrai, Uday O.

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  15. 15

    Protecting data privacy in health services research

    Publicado em 2000
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  16. 16
  17. 17

    Intrusion prevention and active response deploying network and host IPS / Por Rash, Michael

    Publicado em 2005
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  18. 18

    Role-based access control Por Ferraiolo, David

    Publicado em 2003
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  19. 19

    Outsourcing information security Por Axelrod, C. Warren

    Publicado em 2004
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  20. 20

    User's guide to cryptography and standards Por Dent, Alexander W.

    Publicado em 2005
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico