Information Technology Security Assessment

Results: 459



#Item
51Business / Outsourcing / Managed Print Services / Printer / Océ / Xerox / Information security / Print Audit / Office equipment / Media technology / Printing

September 13, 2010 Strategic Assessment Why You Should Consider Managed Print Services

Add to Reading List

Source URL: www.xeretec.co.uk

Language: English - Date: 2010-10-14 08:53:12
52Information technology management / Project management / Records management / Risk management / Management system / Safety Management Systems / Risk assessment / Systems engineering process / Internal audit / Risk / Security / Safety

Environmental Planning QGQ-EM01P - Rev. A 1.0 PURPOSE The purpose of this procedure is to ensure that all activities relating to the Environment are

Add to Reading List

Source URL: queenslandglass.com.au

Language: English - Date: 2013-06-24 01:06:22
53Accreditation / Quality assurance / Audit / Conformity assessment / Auditing / Information security / National Accreditation Board for Testing and Calibration Laboratories / Evaluation / Security / Standards

ACCREDITATION RULE 25 Issue Date: Implementation Date: Supersedes: SUBJECT: Accreditation Program for Information Technology Service Management Systems (ITSMS) APPLIES TO: ISO/IEC

Add to Reading List

Source URL: www.aclasscorp.com

Language: English - Date: 2015-01-02 19:53:18
54Accreditation / Quality assurance / Audit / Conformity assessment / Auditing / Information security / National Accreditation Board for Testing and Calibration Laboratories / Evaluation / Security / Standards

ACCREDITATION RULE 25 Issue Date: Implementation Date: Supersedes: SUBJECT: Accreditation Program for Information Technology Service Management Systems (ITSMS) APPLIES TO: ISO/IEC

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2015-01-02 19:53:18
55Email / Business / Personal life / Technology / Employment / Recruitment / Curriculum vitae

APLICATION FORM PROFESSIONAL PROGRAM IN INFORMATION SECURITY MANAGEMENT Your application is subject to assessment by the program director. When you meet the criteria your application for the program will be confirmed. PE

Add to Reading List

Source URL: www.aicanet.it

Language: English - Date: 2014-12-18 05:43:55
56Library science / National security / Government Accountability Office / Open government / Technology assessment / Public safety / Chief information officer / Information security / Inventory / Data security / Computer security / Security

GAOHighlights, LIBRARY OF CONGRESS: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-03-31 12:08:04
57Information Technology Infrastructure Library / Configuration management database / IT service management / Information security / Event correlation / Reliability engineering / Information technology management / Computing / Systems engineering

PinkVERIFY™ 2011 ITSM Tool Assessment Criteria Availability Management Purpose: “…[E]nsure that the level of availability delivered in all IT services meets the agreed availability needs and/or service level target

Add to Reading List

Source URL: www.pinkelephant.com

Language: English - Date: 2014-10-08 21:00:15
58Information Technology Infrastructure Library / IT service management / Computer security / Screenshot / Configuration management database / Information technology management / Computing / Security

PinkVERIFY™ 2011 ITSM Tool Assessment Criteria Capacity Management Purpose: “… [E]nsure that the capacity of IT services and the IT infrastructure meets the agreed capacityand performance-related requirements in a

Add to Reading List

Source URL: www.pinkelephant.com

Language: English - Date: 2014-10-08 21:00:17
59Administration / Information technology management / Records management / Skills Development Scotland / National Archives of Scotland / Information security / Microsoft SharePoint / Government / Content management systems / Business / Security

Public Records (Scotland) Act 2011 Skills Development Scotland Assessment Report The Keeper of the Records of Scotland 10 July 2014

Add to Reading List

Source URL: www.nrscotland.gov.uk

Language: English - Date: 2014-08-11 08:29:39
60Library science / National security / Government Accountability Office / Open government / Technology assessment / Public safety / Chief information officer / Information security / Inventory / Data security / Computer security / Security

GAO[removed]Highlights, LIBRARY OF CONGRESS: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-31 12:08:04
UPDATE