Logical security

Results: 112



#Item
71Door furniture / Doors / Security / Dead bolt / Latch / Door / Padlock / Cylinder lock / Key / Locks / Gates / Architecture

Door Locks S ecuring the door is the first logical step in the protection of your home against burglary. Therefore the installation of auxiliary locks is a necessary requirement. It must be understood that no lock, no m

Add to Reading List

Source URL: www.crimereductioncanada.com

Language: English - Date: 2011-06-12 03:04:31
72Data management / Data modeling / Data security / Data model / Data architect / DM / Logical data model / Data administration / Information security / Information technology management / Information / Data

DM Operating Procedures and Guidelines

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2014-06-09 14:11:26
73Data / Database theory / Information / Logical data model / Data model / Physical data model / Database / Database design / Book:Databases / Database management systems / Data modeling / Data management

DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2[removed]Baltimore, Maryland[removed]Central Data Administration

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-09-18 14:11:19
74Password / Internet privacy / User / Authorization / Authentication / Computer security / Logical security / Information security / Security / Access control / Computing

PRIVACY IMPACT ASSESSMENT FOR FEDERALREPORTING.GOV RECIPIENT REGISTRATION SYSTEM 1. What information is being collected in the system? The FederalReporting.gov Recipient Registration System (FRRS) contains information on

Add to Reading List

Source URL: www.recovery.gov

Language: English - Date: 2014-06-27 21:31:12
75Project management / Auditing / Actuarial science / Risk management / Risk assessment / Information security / Internal control / Internal audit / IT risk management / Risk / Management / Security

RISK MANAGEMENT PLAN 1. Introduction Risk Management is a logical and systematic process that can be used when making decisions to improve the effectiveness and efficiency of organisational performance. Although most ris

Add to Reading List

Source URL: www.oic.qld.gov.au

Language: English - Date: 2013-02-28 20:20:45
76Virtualization / Hypervisor / Hyper-V / Desktop virtualization / Virtual private server / Application virtualization / Full virtualization / Paravirtualization / Logical partition / System software / Software / Virtual machines

Special Publication[removed]Guide to Security for Full Virtualization Technologies Recommendations of the National Institute

Add to Reading List

Source URL: www.iaca.org

Language: English - Date: 2013-02-07 21:37:40
77Access control / Password / Access token / Authentication / Login / Security token / Logical security / Security / Cryptography / Two-factor authentication

The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-10-13 14:14:16
78Downtime / Failure / Maintenance / System administration / Network security / Managed services / Spyware / Cyberwarfare / HP Network Management Center / Business / Information technology management / Technology

Logical Net Network Management Key Benefits Network Management Our Approach to Network Management

Add to Reading List

Source URL: www.logical.net

Language: English - Date: 2009-05-22 17:23:25
79Deduction / Logical consequence / Propositional calculus / Geometric group theory / Entailment / Monotonicity of entailment / Amenable group / Sequent calculus / Linear logic / Logic / Mathematical logic / Proof theory

A Linear Logic of Authorization and Knowledge⋆ Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning and Michael K. Reiter Carnegie Mellon University Abstract. We propose a logic for specifying security policies at

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:08
80Software development / Standards / Change request / ASP.NET / Software / Systems engineering / Change control

Cabinet for Health and Family Services (CHFS) Information Technology (IT) Policies Category: [removed]Logical Security

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-10-08 20:52:08
UPDATE