Torthaí cuardaigh
Topaicí molta laistigh de do chuardach.
Topaicí molta laistigh de do chuardach.
- Data protection
- Computer security 42
- Law and legislation 31
- Security measures 23
- Privacy, Right of 21
- Computer networks 11
- Access control 8
- Information technology 8
- Management 7
- Data processing 6
- Internet 6
- Planning 6
- Computer crimes 5
- Data recovery (Computer science) 5
- Emergency management 5
- Management information systems 5
- Business 3
- Cyberterrorism 3
- Digital watermarking 3
- Electronic data processing 3
- Electronic surveillance 3
- Government information 3
- Government policy 3
- Medical records 3
- National security 3
- Prevention 3
- Records 3
- Systems and Data Security 3
- Artificial intelligence 2
- Backup processing alternatives 2
-
1
Information assurance for the entrerprise : a roadmap to information security /
Foilsithe / Cruthaithe 2007LEABHAR -
2
-
3
Information security applications : 7th International Workshop, WISA 2006 Jeju Island, Korea, August 28-30, 2006 revised selected papers /
Foilsithe / Cruthaithe 2006LEABHAR -
4
Information assurance for the enterprise : a roadmap to information security /
Foilsithe / Cruthaithe 2007LEABHAR -
5
-
6
The Future of Identity in the Information Society
Foilsithe / Cruthaithe 2009Faigh an téacs iomlán
Leictreonach Ríomhleabhar -
7
I contenuti digitali tecnologie, diritti e libert /
Foilsithe / Cruthaithe 2010Faigh an téacs iomlán
Leictreonach Ríomhleabhar -
8
The economic costs and implications of high-technology hardware theft
Foilsithe / Cruthaithe 1999An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
9
Protection of workers' personal data
Foilsithe / Cruthaithe 1997An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
10
Technology and privacy the new landscape /
Foilsithe / Cruthaithe 1997An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
11
Data privacy in the information age
Foilsithe / Cruthaithe 2000An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
12
Crackproof your software the best ways to protect your software against crackers /
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
13
For the record protecting electronic health information /
Foilsithe / Cruthaithe 1997An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
14
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology /
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
15
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Foilsithe / Cruthaithe 2004An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
16
Getting started with HIPAA
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
17
Disaster recovery planning
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
18
Black hat physical device security exploiting hardware and software /
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
19
Privacy protection and computer forensics
Foilsithe / Cruthaithe 2004An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
20
Techniques and applications of digital watermarking and content protection
Foilsithe / Cruthaithe 2003An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar