Search

Your search keyword '"Data security -- Analysis"' showing total 64 results

Search Constraints

Start Over You searched for: Descriptor "Data security -- Analysis" Remove constraint Descriptor: "Data security -- Analysis" Journal mena report Remove constraint Journal: mena report
64 results on '"Data security -- Analysis"'

Search Results

1. Security Analysis Of Database Technologies In Federal Authorities (sidb)

2. Carrying Out Slide Digitalization, Data Storage, Pre-analytics And Secure Data Transfer Services As Part Of The Rhu Sprint Project

4. Cybersecurity Capability Maturity Model (c2m2) Assessment for Vietnam Electricity (evn)

5. Models For A Data Concierge Service For A National Secure Data Service

6. Technical Assistance Services To Carry Out In-depth Analysis And Benchmarking Of Ukrainian Legislation In The Specific Field Of Data Protection And Digitization, With The Aim Of Assessing Compliance With Relevant Eu Regulations And Directives, All In The

7. Firewall Support Services

8. Provision Of Cybersecurity Services

9. Supply Of Vulnerability Penetration Testing, Networking Equipment, Firewall, Switches, Vulnerability Assessment Of Servers, Vulnerability Assessment Of Desktops & Printers. Qty : 1

10. Enterprise Next Generation Firewall

11. Procurement Of Research Data From Securities Analysis Nda

12. Public Order Of Analysis Of The Existing State Of Cyber Security And Security Culture Of The Client, System Security Review And Implementation Of Training In The Field Of Cyber Security

13. Services For The Evaluation Of The Maturity Level Of The Exchange Processes Of Hospital Information Systems, The Assessment Of Personal Data Protection And The Creation Of Measures To Strengthen Perso

14. Implementation Of Digitization Strategy, Digital Signature

15. Services For The Evaluation Of The Maturity Level Of The Exchange Processes Of Hospital Information Systems, The Assessment Of Personal Data Protection And The Creation Of Measures To Strengthen Personal Data Protection

18. Unlocking Data To Inform Secure Investment

19. Expansion Of The Firewall System For Collecting And Analyzing Logs For Firewalls Owned By Centrum E-zdrowie

21. Data Protection Specialist

22. United States : CompTIA ISAO Adds Real-time Cybersecurity Threat Analysis and Intelligence Resources from Sophos

23. Provision Of Bio-informatical Analyzes And Secure High Speed Data Storage (ngs) For Montpellier Chu Laboratories

24. Impact Assessment Of Personal Data Protection On The General Information Telephone Conversations

25. Provide A Secure Hosted Environment Where Approved Data Users Are Given Access-controlled Remote Access To Carry Out Research Projects And Analysis

26. Feasibility Study: Cybersecurity In The Energy Infrastructure Of Paraguay

27. Delivery Of Firewalls And Licenses For The Needs Of The State Fund 'agriculture'

28. Ebn Cyber security Services

29. Ebn Cyber security Services

30. United States : Minnesota Leads Nation in Cybersecurity and IT Modernization Efforts

31. Analysis And Diagnosis Services Of The Cybersecurity Industry In Spain

32. Cybersecurity Talent Analysis And Diagnosis Services In Spain

33. Provision Of Talent Analysis And Diagnosis Services In Cybersecurity In Spain

34. Analysis, Interpretation And Translation Service Of Cybersecurity Vulnerabilities Into Spanish

37. Cybersecurity Talent Analysis And Diagnosis Services In Spain

38. Study Services, Expertise, Projects, And Governance In Cybersecurity

39. United States : U.S. Army, Michigan State Police drive automotive Cybersecurity

40. United States : Combat System Cybersecurity and Navigation Resilience Fuel US DoD C4ISR 2018-2023 Spend

42. Hosting, Support And Development Of An Existing Database With Secure Web-based Data Capture, Analysis And Reporting

43. Lithuania : National Cyber Security Centre provides analysis of the recent cyber-incident in a news website

44. Cyber Security Services

45. Assessment Of City%s Compliance With Pci Data Security Standards

48. Execution Of Works On Conformity Assessment Of The State Information System Uniform Regional Navigation And Information System Of The City Of Moscow, The Requirements Of The Data Protection

49. Multiple Leased Line Router Cum Firewall. Make: Cyberroam, Model No. Cr10ing Or Similar. As Per Annexure Attached

50. Impact Assessment Of Cybersecurity Threats

Catalog

Books, media, physical & digital resources