Ngā hua rapu
Ngā kaupapa kua whakahuatia i roto i tō rapu.
Ngā kaupapa kua whakahuatia i roto i tō rapu.
- Data protection
- Computer security 42
- Law and legislation 31
- Security measures 23
- Privacy, Right of 21
- Computer networks 11
- Access control 8
- Information technology 8
- Management 7
- Data processing 6
- Internet 6
- Planning 6
- Computer crimes 5
- Data recovery (Computer science) 5
- Emergency management 5
- Management information systems 5
- Business 3
- Cyberterrorism 3
- Digital watermarking 3
- Electronic data processing 3
- Electronic surveillance 3
- Government information 3
- Government policy 3
- Medical records 3
- National security 3
- Prevention 3
- Records 3
- Systems and Data Security 3
- Artificial intelligence 2
- Backup processing alternatives 2
-
1
Information assurance for the entrerprise : a roadmap to information security /
I whakaputaina 2007Pukapuka -
2
-
3
-
4
Information assurance for the enterprise : a roadmap to information security /
I whakaputaina 2007Pukapuka -
5
-
6
The Future of Identity in the Information Society
I whakaputaina 2009Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
7
I contenuti digitali tecnologie, diritti e libert /
I whakaputaina 2010Whiwhi kuputuhi katoa
Tāhiko īPukapuka -
8
The economic costs and implications of high-technology hardware theft
I whakaputaina 1999An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
9
Protection of workers' personal data
I whakaputaina 1997An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
10
Technology and privacy the new landscape /
I whakaputaina 1997An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
11
Data privacy in the information age
I whakaputaina 2000An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
12
-
13
For the record protecting electronic health information /
I whakaputaina 1997An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
14
-
15
-
16
Getting started with HIPAA
I whakaputaina 2003An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
17
Disaster recovery planning
I whakaputaina 2002An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
18
Black hat physical device security exploiting hardware and software /
I whakaputaina 2005An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
19
Privacy protection and computer forensics
I whakaputaina 2004An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka -
20
Techniques and applications of digital watermarking and content protection
I whakaputaina 2003An electronic book accessible through the World Wide Web; click to view
Tāhiko īPukapuka