User contributions
From LIMSWiki
Jump to navigationJump to search- 22:00, 21 June 2016 diff hist +415 N Business continuity planning Transcluded, per John current
- 21:57, 21 June 2016 diff hist +429 N IT Baseline Protection Catalogs Transcluded, per John current
- 21:55, 21 June 2016 diff hist +450 N Information technology security audit Transcluded, per John current
- 21:53, 21 June 2016 diff hist +386 N ISO/IEC 27000 Transcluded, per John current
- 21:52, 21 June 2016 diff hist +19 m Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices →Cloud Computing Security Handbook: Regulatory Compliance and Best Practices: Added item
- 21:49, 21 June 2016 diff hist +397 N Information security management Transcluded, per John current
- 21:47, 21 June 2016 diff hist +424 N Vulnerability management Transcluded, per John current
- 21:41, 21 June 2016 diff hist +400 N Secret sharing Transcluded, per John current
- 21:40, 21 June 2016 diff hist +404 N Key distribution Transcluded, per John current
- 21:38, 21 June 2016 diff hist +416 N Homomorphic encryption Transcluded, per John current
- 21:37, 21 June 2016 diff hist +424 N Digital transaction management Transcluded, per John current
- 21:34, 21 June 2016 diff hist +451 N Bring your own encryption Transcluded, per John current
- 21:30, 21 June 2016 diff hist +424 N Attribute-based encryption Transcluded, per John current
- 21:25, 21 June 2016 diff hist +415 N Security as a service Transcluded, per John
- 21:23, 21 June 2016 diff hist +412 N Cloud computing security Transcluded, per John current
- 21:21, 21 June 2016 diff hist +375 N Information security Transcluded, per John current
- 21:15, 21 June 2016 diff hist +381 N Network security Transcluded, per John current
- 21:13, 21 June 2016 diff hist +383 N Computer security Transcluded, per John current
- 21:11, 21 June 2016 diff hist +334 N Security Transcluded, per John
- 21:07, 21 June 2016 diff hist +448 N Payment Card Industry Data Security Standard Transcluded, per John current