11![GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses](https://www.pdfsearch.io/img/93307e3f8e5c6a690a4c587d63e778cd.jpg) | Add to Reading ListSource URL: www.copyright.govLanguage: English - Date: 2015-04-01 14:00:53
|
---|
12![© JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015) © JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)](https://www.pdfsearch.io/img/c19530318fcabb34c4e68199cf904af2.jpg) | Add to Reading ListSource URL: www.eco.gov.yk.caLanguage: English - Date: 2016-01-26 14:30:26
|
---|
13![UTC Project Information Project Title Transit and Rail Security: A Critical Assessment of What Works UTC Project Information Project Title Transit and Rail Security: A Critical Assessment of What Works](https://www.pdfsearch.io/img/6d1ac4407d8a819ec3b4d95b3149a220.jpg) | Add to Reading ListSource URL: transweb.sjsu.eduLanguage: English - Date: 2016-02-01 14:34:30
|
---|
14![Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2) Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)](https://www.pdfsearch.io/img/ebec83d1db57e672add1a2c9af2b6210.jpg) | Add to Reading ListSource URL: www.nebraskacert.orgLanguage: English - Date: 2010-05-19 17:57:00
|
---|
15![Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of: Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:](https://www.pdfsearch.io/img/f327aa0cb680df05461215a62065d475.jpg) | Add to Reading ListSource URL: naveen.ksastry.comLanguage: English - Date: 2013-06-08 15:25:46
|
---|
16![Complete Assessment Lifecycle Complete Assessment Lifecycle](https://www.pdfsearch.io/img/cae155ed3ba4ec5d86547fede6309428.jpg) | Add to Reading ListSource URL: www.wurldtech.comLanguage: English - Date: 2015-07-15 01:28:14
|
---|
17![HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference Safeguard (Standard) HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference Safeguard (Standard)](https://www.pdfsearch.io/img/9a1a84558f40323ea98f63dc950fc328.jpg) | Add to Reading ListSource URL: www.securitymetrics.comLanguage: English - Date: 2015-07-14 12:51:45
|
---|
18![Business / Accountability / Executive agencies of the Scottish Government / Security / Records management / Scottish Natural Heritage / Information security / Electronic document and records management system / National Archives of Scotland / Content management systems / Administration / Information technology management Business / Accountability / Executive agencies of the Scottish Government / Security / Records management / Scottish Natural Heritage / Information security / Electronic document and records management system / National Archives of Scotland / Content management systems / Administration / Information technology management](/pdf-icon.png) | Add to Reading ListSource URL: www.nas.gov.ukLanguage: English - Date: 2014-08-28 06:41:07
|
---|
19![Microsoft Word - Information Security Risk Management for Healthcare Systems.doc Microsoft Word - Information Security Risk Management for Healthcare Systems.doc](https://www.pdfsearch.io/img/29bc39a20b263599cb616a35f19bfaec.jpg) | Add to Reading ListSource URL: www.medicalimaging.orgLanguage: English - Date: 2014-06-12 12:27:58
|
---|
20![Mass Surveillance
Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Mass Surveillance
Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?](https://www.pdfsearch.io/img/7df2d4782e3d8a4370c220c56a20d56d.jpg) | Add to Reading ListSource URL: www.europarl.europa.euLanguage: English - Date: 2015-02-12 15:10:03
|
---|