Search Results
Suggested Topics within your search.
Suggested Topics within your search.
- Access control
- Computers 37
- Computer networks 32
- Computer security 30
- Security measures 29
- Privacy, Right of 20
- Law and legislation 18
- Medical records 18
- Data protection 15
- Freedom of information 13
- Public records 11
- Computer Security 10
- Confidential communications 10
- Internet 10
- Government information 9
- Confidentiality 8
- Research 8
- Government policy 6
- Information services 6
- Information technology 6
- Penetration testing (Computer security) 6
- Data processing 5
- Electronic information resources 5
- Medical Informatics 5
- Medical Records 5
- Medical care 5
- Medical informatics 5
- Political aspects 5
- Privacy 5
- Records 5
-
1
-
2
Improving access to and confidentiality of research data : report of a workshop
Published 2000Full text (MFA users only)
Electronic eBook -
3
-
4
Critical information infrastructure protection and the law : an overview of key issues
Published 2003Full text (MFA users only)
Electronic eBook -
5
-
6
-
7
Integrated identity management : using IBM Tivoli security solutions
Published 2004Full text (MFA users only)
Electronic eBook -
8
Deployment guide series : IBM Tivoli Security Compliance Manager
Published 2005Full text (MFA users only)
Electronic eBook -
9
-
10
Perfect passwords : selection, protection, authentication
Published 2006Full text (MFA users only)
Electronic eBook -
11
Intrusion prevention and active response : deploying network and host IPS
Published 2005Full text (MFA users only)
Electronic eBook -
12
Check Point NG VPN-1/firewall-1 : advanced configuration and troubleshooting
Published 2005Full text (MFA users only)
Electronic eBook -
13
Putting people on the map : protecting confidentiality with linked social-spatial data
Published 2007Full text (MFA users only)
Electronic eBook -
14
Governmental transparency in the path of administrative reform
Published 2007Full text (MFA users only)
Electronic eBook -
15
Integrated security systems design : concepts, specifications, and implementation
Published 2007Full text (MFA users only)
Electronic eBook -
16
Full disclosure : the perils and promise of transparency
Published 2007Full text (MFA users only)
Electronic eBook -
17
Implementing NAP and NAC security technologies : the complete guide to network access control
Published 2008Full text (MFA users only)
Electronic eBook -
18
Role engineering for enterprise security management
Published 2008Full text (MFA users only)
Electronic eBook -
19
Beyond the HIPAA privacy rule : enhancing privacy, improving health through research
Published 2009Full text (MFA users only)
Electronic eBook -
20
User's Guide tp Crytography and Standards.
Published 2004Full text (MFA users only)
Electronic eBook