Search results

Jump to navigation Jump to search
  • ===Security=== = Security =
    13 KB (1,870 words) - 16:05, 19 March 2013
  • ...group, only those users get to see transfers/sips where we have matches on security keywords/regexs
    10 KB (1,519 words) - 13:15, 16 May 2012
  • (7:44:06 PM) vangarderen.peter: well, we'll have 'security' and 'copyright' as two different types of restrictions. The restrictions o ...rderen.peter: if it gets more complicated we can always split that up into security and copyright
    13 KB (1,806 words) - 15:28, 21 September 2011
  • ===Security=== = Security =
    25 KB (3,792 words) - 19:51, 10 September 2013
  • ...ds to start identifying groups of documents that have personal information security requirements. *work with IT Security to set up test for saving AIPs to server storage (Sue, Heather)
    16 KB (2,535 words) - 11:19, 3 July 2015
  • ...from version 1.x to version 6.x. This should improve performance and ease security concerns with the previous version of Elasticsearch. If you are upgrading A
    7 KB (933 words) - 15:51, 22 May 2019
  • ...vematica-1.7/admin-manual/security/security/#user-security Security - User Security]
    19 KB (2,587 words) - 16:33, 1 May 2018
  • ...ure the efficacy of the virus scanning micro-service. Similarly, software security updates are downloaded at the operating system level, to keep the host mach
    7 KB (949 words) - 14:43, 12 November 2019
  • ...dex the native XML metadata, full-text index any text-based files, display security/privacy keywords, run FITS and add XML to ES, generate visualizations from
    8 KB (1,169 words) - 15:12, 21 September 2011
  • (10:45:28 AM) peterVG: berwin22: privacy and security keywords, pattern matching (for SIN #'s, credit card #'s, etc)
    10 KB (1,456 words) - 15:14, 21 September 2011
  • ...58 AM) peterVG: i've got to telecon with them tomorrow to update on CoV IT security reqs
    11 KB (1,577 words) - 14:45, 15 February 2012
  • ...of its locations. By disabling newly created Pipelines, it provides some security against unwanted perusal of the files in Locations, or use by unauthorized ===Security===
    51 KB (7,719 words) - 12:50, 7 May 2014
  • ...of its locations. By disabling newly created Pipelines, it provides some security against unwanted perusal of the files in Locations, or use by unauthorized ===Security===
    52 KB (7,881 words) - 10:58, 1 July 2014
  • ...of its locations. By disabling newly created Pipelines, it provides some security against unwanted perusal of the files in Locations, or use by unauthorized ===Security===
    59 KB (8,913 words) - 18:20, 7 August 2014
  • ...e.google.com/p/browsersec/wiki/Part2#Same-origin_policy same-origin policy security mechanism] implemented in modern browsers.
    14 KB (1,994 words) - 16:43, 11 February 2020
  • ...wer Library, the combination of which is generally known as "the Library." Security guards will be advised that the conference is happening and can direct you
    22 KB (3,270 words) - 22:52, 20 June 2018

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)