Information Security

A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy

Information Security / Machine Learning / Data Mining / Computer Security

Segurança e Liberdade na Sociedade Global em Rede, uma perspetiva europeia

Information Security / European Law / Network Society / IT law / PERSONAL DATA PROTECTION / European Union Law / Privacy and data protection / Cyber Security / EU law and politics on data protection and privacy / EU data protection framework / Privacy Data Protection Law / Data protection law / European Union Law / Privacy and data protection / Cyber Security / EU law and politics on data protection and privacy / EU data protection framework / Privacy Data Protection Law / Data protection law

FATORES CRÍTICOS DE SUCESSO EM SEGURANÇA DA INFORMAÇÃO EM UM ÓRGÃO DA ADMINISTRAÇÃO PÚBLICA FEDERAL

Public Administration / Information Security / Administration / Engenharia de Produção

UMA METODOLOGIA PARA IMPLANTAÇÃO DE UM SISTEMA DE GESTÃO DE SEGURANÇA DA

Information Systems / Information Security / Risk Management / Security Management / Case Study / Environmental protection

Agar bisa d remote glassfish

Computer Science / Information Security / Computer Networks / Computer Security

IS 2007 PC Co-chairs’ Message

Information Security / Research and Development

Percepção de qualidade em Segurança da Informação em um órgão da Administração Pública Federal

Logic And Foundations Of Mathematics / Information Security / Security Studies / Service Quality / Karl Popper / Environmental Security / Paraconsistent logic / Cyber Security / SERVQUAL / SERVPERF / Estudos de Defesa, Defesa Estratégica, Segurança Estratégica, Segurança Externa, Segurança Interna, Segurança Pública, Gestão Estratégica Internacional, Sistema Interestatal, Guerras e Conflitos, Poder, Ciência Política, Sociologia, Antropologia. / Environmental Security / Paraconsistent logic / Cyber Security / SERVQUAL / SERVPERF / Estudos de Defesa, Defesa Estratégica, Segurança Estratégica, Segurança Externa, Segurança Interna, Segurança Pública, Gestão Estratégica Internacional, Sistema Interestatal, Guerras e Conflitos, Poder, Ciência Política, Sociologia, Antropologia.

A Systematic Review of Cloud Infrastructure Providing High Level of Services

Information Security / Data Mining / Software Engineering education / Databases / Cloud Computing Security

Segurança da informação - uma abordagem social

Information Technology / Information Security / IT Governance

Da Estratégia de Segurança da Informação na União Europeia

Information Security / Network Security / European Union / PERSONAL DATA PROTECTION / European Union Law / Privacy and data protection / EU law and politics on data protection and privacy / Espace Schengen / Privacy and data protection / EU law and politics on data protection and privacy / Espace Schengen

Preserving Trajectory Privacy in Participatory Sensing Applications

Computer Science / Information Security / Computer Engineering / Privacy / Network Security / Information Security and Privacy / Privacy and data protection / Location Privacy / Information Security and Privacy / Privacy and data protection / Location Privacy

Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records

Information Systems / Information Technology / Information Security / Access Control / Computer Security / Access To Information / OPERATING SYSTEM / Software / Library and Information Studies / Humans / Computer Systems / Privacy Protection / Health information / Confidentiality / Health Information System / Public health systems and services research / Medical Records / Access To Information / OPERATING SYSTEM / Software / Library and Information Studies / Humans / Computer Systems / Privacy Protection / Health information / Confidentiality / Health Information System / Public health systems and services research / Medical Records

DBSy in a Commercial Services Context

Information Security / Information Communication Technology / Information Assurance / Risk Analysis / Service management / Security Requirements / Network Architecture / Service Level Agreement / Security Requirements / Network Architecture / Service Level Agreement
Copyright © 2017 DADOSPDF Inc.