Suggested Topics within your search.
Suggested Topics within your search.
- Data protection 203
- Computer security 83
- Law and legislation 70
- Privacy, Right of 50
- Security measures 44
- Computer networks 20
- Information technology 16
- Access control 14
- Data processing 14
- Management 14
- Computer crimes 12
- Planning 12
- Data recovery (Computer science) 10
- Emergency management 10
- Management information systems 10
- Electronic surveillance 8
- Internet 8
- Artificial intelligence 6
- Business 6
- COMPUTERS / Security / General 6
- Computer Security 6
- Confidentiality 6
- Cyberterrorism 6
- Digital watermarking 6
- Electronic data processing 6
- European Union 6
- Government Regulation 6
- Government policy 6
- Medical records 6
- National security 6
-
1
Microsoft Data Protection Manager 2010 a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010 /
Published 2011Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Microsoft Data Protection Manager 2010 a practical step-by-step guide to planning deployment, installation, configuration, and troubleshooting of Data Protection Manager 2010 /
Published 2011Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Data protection and consumer privacy an Emerald guide.
Published 2004Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Data protection and consumer privacy an Emerald guide.
Published 2004Subjects: “…Data protection.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Information assurance for the entrerprise : a roadmap to information security /
Published 2007Subjects:Book -
6
Information assurance for the enterprise : a roadmap to information security /
Published 2007Subjects:Book -
7
Data privacy in the information age
Published 2000Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Information assurance and computer security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
10
-
11
A process for developing a common vocabulary in the information security area
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook -
12
Comptia Security+ 2008 in depth
Published 2009Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Information security policy, processes, and practices /
Published 2008Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Getting started with FortiGate /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Getting started with FortiGate /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Information assurance for the enterprise : a roadmap to information security /
Published 2007Subjects:Book -
17
Information assurance for the entrerprise : a roadmap to information security /
Published 2007Subjects:Book -
18
Data privacy in the information age
Published 2000Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Black hat physical device security exploiting hardware and software /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Information assurance and computer security
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic Conference Proceeding eBook