National security

Results: 72580



#Item
301Computer security

Commission on Enhancing National Cybersecurity Established by Executive Order 13718, Commission on Enhancing National Cybersecurity Meeting Agenda

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-06-20 15:43:29
    302Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

    lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

    Add to Reading List

    Source URL: www.financial-ombudsman.org.uk

    Language: English - Date: 2016-02-24 11:29:57
    303Prevention / Security / Safety / Computer security / Data security / National security / Cryptography / Information security / Family Educational Rights and Privacy Act / Health Insurance Portability and Accountability Act / Medical privacy / Privacy

    RFP Information Security Requirements

    Add to Reading List

    Source URL: forallschools.s3.amazonaws.com

    Language: English - Date: 2015-06-14 20:29:02
    304Government / United States Department of Homeland Security / DHS National Protection and Programs Directorate / Federal Protective Service / Cyberwarfare

    National Protection and Programs DirectorateNPPD HURRICANE PREPAREDNESS EVENT DETAILS Date: June 2, 2016

    Add to Reading List

    Source URL: minnesotainfragard.files.wordpress.com

    Language: English - Date: 2016-05-26 15:46:54
    305Computer security / Government / Security / Cyberwarfare / United States Department of Homeland Security / National security / Cybercrime / NH-ISAC / Cyber-security regulation / United States Computer Emergency Readiness Team / National Cybersecurity Center of Excellence / Food and Drug Administration

    FDA CENTER FOR DEVICES & RADIOLOGICAL HEALTH (CDRH), NATIONAL HEALTH INFORMATION SHARING ANALYSIS CENTER (NH-ISAC), THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS), AND

    Add to Reading List

    Source URL: www.fda.gov

    Language: English
    306Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Recreational Software Advisory Council / Critical infrastructure

    PANELISTS: SESSION ID: SPO02-T11 Ammar Alkassar

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2016-03-23 13:52:21
    307Prevention / Law enforcement / Terrorism / Safety / National security / Security / Public safety / Counter-terrorism / Surveillance / Definitions of terrorism

    Rental Properties What should I consider suspicious? Suspicious purchasing activity • Use cash for large transactions or a credit card in someone else’s name.

    Add to Reading List

    Source URL: www.homelandsecurity.ohio.gov

    Language: English - Date: 2013-01-30 08:13:49
    308Medical law / Security / Economy / Crime prevention / Cryptography / Information governance / National security / Medical privacy / Protected health information / Insurance / Power of attorney / Privacy

    Release of Medical Information rev2015

    Add to Reading List

    Source URL: studenthealth.missouri.edu

    Language: English - Date: 2016-07-20 17:04:00
    309Security / Prevention / Computer security / Human communication / Humancomputer interaction / Identity management / Password / Biometrics / Access control / Password bank / Private biometrics

    HCISEC Workshop Proposal 1 HCI and Security Systems Andrew Patrick National Research Council of Canada

    Add to Reading List

    Source URL: www.andrewpatrick.ca

    Language: English - Date: 2002-09-20 12:11:26
    310Mass surveillance / National Security Agency / United States government secrecy / Customer relationship management / Government procurement in the United States / Channel partner / Marketing / Business / Government / Computing

    EX-160 FOUNDED 1997 This Company is a focused Government contractor specializing in Information

    Add to Reading List

    Source URL: www.itmandaforum.com

    Language: English - Date: 2015-04-14 11:48:19
    UPDATE