Search Results: 'data security'

Search

×
×
×
×
226 results for "data security"
Data Security at Mossack Fonseca By Mers Aberden
eBook (PDF): $8.99
Your information has never been safer than with Mossack Fonseca's secure Client Portal. To ensure we can provide our clients with the most secure and up-to-date protection available, we house all... More > of our servers in-house. Our Client Portal encryption certificates use the most powerful secure socket layer (SSL) encryption commercially available today. VeriSign is one of the most recognizable Internet security providers, and offers the strongest encryption available with the most rigorous authentication standards. Mossack Fonseca has always provided our clients with the most secure technology available and we join the 95% percent of Fortune 500 companies as well as the world's 40 largest banks who rely on this technology to keep client information protected.< Less
Data Protection in Higher Education: A Comprehensive Review of IT Security Policies in a University Environment. By Michael Wells
eBook (PDF): $0.00
Computer information is omnipresent and when organizations collect and retain information about others, either in the form of financial records, personal data, or medical records, that organization... More > has an obligation to protect the information from falling into the wrong hands. One thing that makes colleges and universities different from corporate businesses is the fact that they are places for learning and exploring. Therefore, not only should policies have a succinct structure, but also they need to allow academic freedom while still being adhered to by various types of users. Human Resources and administration should work in partnership with IT to put policies in place quickly. The biggest barrier to swift development and deployment of computer security policies is the bureaucracy that is created within academia.< Less
Computer Security Exploits: Web Security By Wilbur Newhart
Paperback: List Price: $60.00 $36.00 | You Save: 40%
Prints in 3-5 business days
(1 Ratings)
An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on... More > computer software, hardware, or something electronic. Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack.< Less
Introduction to Servers and Data Centers By CDTS LLC
Paperback: $25.00
Prints in 3-5 business days
An introductory data center and server exercise and resource manual that provides 20 modules covering server hardware, virtualization and security.
Present Value of Data Furnished By Homework Help Classof1
eBook (PDF): $5.99
Value the financial instrument below using excels functions. A security that will begin making payments when you retire in 20 of $20,000 per year for 3 years, then declines by 10% per year for the... More > next 3 years after that, and pays nothing thereafter. (Assume the discount rate is 10%)< Less
Cloud Infrastructure and Data Center By Duong Tran
eBook (ePub): $9.99
Cloud Infrastructure and Data Center Book is a collection of Information Technology big pictures. The purpose of the book is to help students and network system administrators to learn Information... More > Technology. The book covers many topics such as networking, system administration, cabling, VOIP, desktop management, server management, information storage, IT security, wireless, mobile management, cloud infrastructure, software-defined-data-center, software-defined-storage, software-defined-network, data center, automation, orchestration, problem solving, disaster and recovery, risk management, asset management, time management, budget management, project management, IT services, and the future of IT. The rated is entry level to manager level. The actual values of this book are $10,000 of training and four years degree.< Less
Data Protection for Slightly Bigger Companies By Alan Gillies
Paperback: List Price: $26.29 $21.03 | You Save: 20%
Prints in 3-5 business days
This practical hand book is designed to help small and slightly larger businesses look after their information and the information they hold on behalf of customers, clients and employees. It covers... More > the Data Protection Act and other similar legislation, standards for data protection (BS10012) and information security (ISO27001) and is designed to help companies highlight their risks, weaknesses and threats.< Less
The Path to IT Security: A Career Guide By Alexander Tang
Paperback: $16.18
Prints in 3-5 business days
“News report – Credit Crunch, Nationalisation, Fraud, Data Loss, Systems been hacked”. Job redundancies, boredom, need a new challenge. How about a new career in IT Security. This... More > guide book will provide the necessary information to get you started.< Less
The Path to IT Security: A Career Guide By Alexander Tang
eBook (PDF): $6.51
“News report – Credit Crunch, Nationalisation, Fraud, Data Loss, Systems been hacked”. Job redundancies, boredom, need a new challenge. How about a new career in IT Security. This... More > guide book will provide the necessary information to get you started.< Less
Information Security In Health Systems By Ali Mosallanejad (Sami Ali) et al.
eBook (ePub): $60.00
In this work user’s privacy rules, security basics, protection of privacy, integration, and the availability data will be presented. Also it will explain about security program components,... More > rules, processes, and standards, and also quality of management and risk analysis, assessment, identification and assessment of ancillary system.< Less