1
by Murphy, Sean P.
Published 2015
McGraw-Hill Education
Table of Contents: ... -- Information security and privacy events management -- Part II: Healthcare Information Privacy and Security...

2
by Kissell, Joe
Published 2017
Alt concepts Inc.
Subjects: ...Web services / fast...

3
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ..., and PKI -- pt. II. Privacy and security for users. The Web's war on your privacy -- Privacy-protecting...

4
by Mather, Tim
Published 2009
O'Reilly
Table of Contents: ... -- Identity and access management -- Security management in the cloud -- Privacy -- Audit and compliance...

5
by Herold, Rebecca, Hertzog, Christine
Published 2015
Auerbach
Subjects: ...Public utilities / Security measures / fast...

6
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ...Introduction to the cloud and fundamental security and privacy issues of the cloud / Hassan Takabi...

7
by Pfleeger, Charles P., Pfleeger, Shari Lawrence
Published 2002
Pearson
Subjects: ...Privacy, Right of / fast...

8
by Cannon, J.
Published 2004
Addison-Wesley Professional
Subjects: ...Computer security / fast...

9
by Scott, Adam D.
Published 2017
O'Reilly Media
Subjects: ...Privacy, Right of / fast...

10
Published 2023
Apress
Subjects: ...Application program interfaces (Computer software) / fast...

11
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... The Cloud Provider's Perspective 74 Questions That Matter 75 In Summary 76 Chapter 5: Cloud-Based IT Service...

12
by Trinckes, John J.
Published 2012
Auerbach Publications
Table of Contents: .../HITECH to Healthcare Organizations; Chapter 3 -- Compliance Overview; Chapter 4 -- Privacy Rule Detailed...

13
by Siepmann, Frank
Published 2014
CRC Press
Subjects: ...Risk assessment / fast...

14
by Larson, Jessica Megan
Published 2022
Apress
Table of Contents: .... Data Privacy Laws and Regulatory Drivers -- 4. Permission types -- Part II. Creating Roles -- 5...

15
by Abbadi, Imad M.
Published 2014
John Wiley & Sons Inc.
Table of Contents: ... Services Interdependency -- 5.6. Security and Privacy by Design -- 5.7. Multi-tier Application Deployment...

16
by Samani, Raj, Honan, Brian, Reavis, Jim
Published 2015
Syngress
Table of Contents: ...SECURITY, TRUST AND ASSURANCE REPOSITORY INITIATIVEENGAGING WITH THE CLOUD SERVICE PROVIDER; END...

17
by Craig, Terence
Published 2011
O'Reilly Media
Table of Contents: ...: Privacy versus Security and Safety; Bibliography; Chapter 2. The Right to Privacy in the Digital Age; What...

18
by El-Bawab, Abd El-Monem A.
Published 2014
Packt Publishing
Table of Contents: ...; Configuring Untangle NGFW Services ports; Untangle NGFW network services; Untangle NGFW as a router; Untangle...

19
by Waschke, Marvin
Published 2017
Apress
Table of Contents: ...1. What's biting us? -- 2. Why is computer security so weak? -- 3. How does computer security work...

20
Published 2020
Wiley
Table of Contents: ... -- The Entity's System Objectives and Principal System Objectives -- Selecting the Trust Services Category...