Security Management

Results: 59084



#Item
1012  Transboundary River Basin Management: Addressing Water, Energy and Food Security Hanne Bach, Jeremy Bird, Torkil Jønch Clausen,

2 Transboundary River Basin Management: Addressing Water, Energy and Food Security Hanne Bach, Jeremy Bird, Torkil Jønch Clausen,

Add to Reading List

Source URL: www.mrcmekong.org

- Date: 2012-09-19 05:30:38
    102ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

    ITL BULLETIN FOR JULY 2016 IMPROVING SECURITY AND SOFTWARE MANAGEMENT THROUGH THE USE OF SWID TAGS David Waltermire, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

    Add to Reading List

    Source URL: csrc.nist.gov

    - Date: 2016-08-23 14:55:14
      103Virtual CPE NFV Solution for Security Services 21st Nov 2013 Calsoft Labs designed and developed a Virtual CPE NFV solution targeting telecom operators to provide security services and management. We were also instrument

      Virtual CPE NFV Solution for Security Services 21st Nov 2013 Calsoft Labs designed and developed a Virtual CPE NFV solution targeting telecom operators to provide security services and management. We were also instrument

      Add to Reading List

      Source URL: sdn.calsoftlabs.com

      - Date: 2014-03-25 06:13:33
        104U.S. DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency National Flood Insurance Program ELEVATION CERTIFICATE

        U.S. DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency National Flood Insurance Program ELEVATION CERTIFICATE

        Add to Reading List

        Source URL: pjosurvey.com

        - Date: 2016-04-15 14:44:01
          105Usable Security and Privacy: A Case Study of Developing Privacy Management Tools Carolyn. Brodie, Clare-Marie Karat, John Karat IBM T. J. Watson Research Center 19 Skyline Drive

          Usable Security and Privacy: A Case Study of Developing Privacy Management Tools Carolyn. Brodie, Clare-Marie Karat, John Karat IBM T. J. Watson Research Center 19 Skyline Drive

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          - Date: 2005-05-30 20:35:30
            106Tender NoStore  TENDER DOCUMENT PURCHASE OF UNIFIED THREAT MANAGEMENT (UTM) FOR WEB AND LAN SECURITY

            Tender NoStore TENDER DOCUMENT PURCHASE OF UNIFIED THREAT MANAGEMENT (UTM) FOR WEB AND LAN SECURITY

            Add to Reading List

            Source URL: www.fsi.nic.in

            - Date: 2016-01-12 05:56:02
              107National Security College  National Security College Professional Development Course Risk Management for National Security PractitionersJuly 2016

              National Security College National Security College Professional Development Course Risk Management for National Security PractitionersJuly 2016

              Add to Reading List

              Source URL: nsc.anu.edu.au

              - Date: 2016-06-17 00:59:06
                108Tropentag 2012 International Research on Food Security, Natural Resource Management and Rural Development Resilience of agricultural systems against crises

                Tropentag 2012 International Research on Food Security, Natural Resource Management and Rural Development Resilience of agricultural systems against crises

                Add to Reading List

                Source URL: dpg.phytomedizin.org

                - Date: 2014-06-17 04:19:03
                  109Planning, managing, and providing legal, public safety, protective services and homeland security, including professional and technical support services. Sample Career Specialties / Occupations  Emergency Management and

                  Planning, managing, and providing legal, public safety, protective services and homeland security, including professional and technical support services. Sample Career Specialties / Occupations Emergency Management and

                  Add to Reading List

                  Source URL: sdmylife.com

                  - Date: 2014-08-19 11:15:42
                    110What is Helios? Linear Scalability Helios is a big database management system (BDBMS). It provides the scale of NoSQL combined with data management, security, and semantics.

                    What is Helios? Linear Scalability Helios is a big database management system (BDBMS). It provides the scale of NoSQL combined with data management, security, and semantics.

                    Add to Reading List

                    Source URL: nosql2015.dataversity.net

                    - Date: 2015-07-30 13:13:30