Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Access control
- Computers 969
- Security measures 822
- Computer security 698
- Computer networks 664
- Privacy, Right of 578
- Law and legislation 536
- Medical records 463
- Data protection 399
- Government policy 326
- Government information 248
- Prevention 234
- Internet 212
- Data processing 206
- Data encryption (Computer science) 202
- Public records 186
- Confidential communications 155
- Freedom of information 141
- Management 139
- Administrative agencies 123
- Evaluation 116
- Computer crimes 112
- Information technology 108
- Cryptography 103
- Social security records 92
- Records 91
- Electronic data processing departments 90
- Identification numbers, Personal 88
- Electronic records 83
- Electronic information resources 82
-
1
-
2
Authorizations in SAP S/4HANA and SAP Fiori
Published 2022Online Access (A-Z Journals and Newspapers)
Electronic eBook -
3
Understanding the insider threat proceedings of a March 2004 workshop /
Published 2004Online Access (A-Z Journals and Newspapers)
Electronic eBook -
4
Oracle identity management governance, risk, and compliance architecture /
Published 2008Online Access (A-Z Journals and Newspapers)
Electronic eBook -
5
-
6
Linux firewalls attack detection and response with iptables, psad, and fwsnort /
Published 2007Online Access (A-Z Journals and Newspapers)
Electronic eBook -
7
Role-based access control
Published 2007Online Access (A-Z Journals and Newspapers)
Electronic eBook -
8
The state of the art in intrusion prevention and detection
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook -
9
-
10
Rapid acquisition and fielding for information assurance and cyber security in the Navy
Published 2012Online Access (A-Z Journals and Newspapers)
Electronic eBook -
11
UTM security with Fortinet Mastering FortiOS /
Published 2013Online Access (A-Z Journals and Newspapers)
Electronic eBook -
12
Full disclosure the perils and promise of transparency /
Published 2007Online Access (A-Z Journals and Newspapers)
Electronic eBook -
13
Federated identity primer
Published 2013Online Access (A-Z Journals and Newspapers)
Electronic eBook -
14
Influences on the adoption of multifactor authentication
Published 2011Online Access (A-Z Journals and Newspapers)
Electronic eBook -
15
-
16
Role mining in business taming role-based access control administration /
Published 2012Online Access (A-Z Journals and Newspapers)
Electronic eBook -
17
Client-side attacks and defense
Published 2012Online Access (A-Z Journals and Newspapers)
Electronic eBook -
18
-
19
Foundations of information security a straightforward introduction /
Published 2019Online Access (A-Z Journals and Newspapers)
Electronic eBook -
20
Portfolio assessment of the Department of State internet freedom program
Published 2014Online Access (A-Z Journals and Newspapers)
Electronic eBook