Security Management

Results: 59084



#Item
351Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:27
352Information technology management / Prevention / Information technology / Security / Risk / Data security / IT risk management / Risk analysis / IT risk / ISO 31000 / ISO/IEC 27000-series / ISO/IEC 20000

Neue Subnorm ISOfür Risikomanagement

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:36
353Security / Computer security / Identity management / Prevention / Micro Focus International / RUMBA / Access control / Security and safety features new to Windows Vista / Remote Desktop Services

Data Sheet Host Access Management and Security Server Host Access Management and Security Server Working alongside your Reflection®, Extra!®, Rumba+®, and InfoConnect® software, Micro Focus® Host

Add to Reading List

Source URL: www.attachmate.com

Language: English - Date: 2016-06-20 17:08:49
354Economy / Emergency management / Disaster preparedness / Humanitarian aid / International development / Finance / Security / Actuarial science / Disaster risk reduction / Insurance / Resilience / Disaster

The Fifth Indonesia-Japan Joint Working Group for Development of Bilateral Financial CooperationTheme: Disaster finance, disaster resilience, lessons from disasters Location: Grand Nikko Bali resort, Indonesi

Add to Reading List

Source URL: irides.tohoku.ac.jp

Language: English - Date: 2016-06-07 21:20:13
355Government / Civil defense / Homeland security / Law enforcement in the United States / United States Department of Homeland Security / United States / Emergency management / Filemon Vela Jr. / Jaime Zapata

  January 10, 2013 Senator Lucio and Congressman Vela receive briefing, tour on U.S.-Mexico Border Issues by

Add to Reading List

Source URL: www.lucio.senate.state.tx.us

Language: English - Date: 2014-08-08 14:58:15
356Emergency management / Department of Environment and Natural Resources / Disaster preparedness / Mines and Geosciences Bureau / Geohazard / Ilagan / Ministry of State Security / Disaster / Political repression / Earth

DENR-MINES AND GEOSCIENCES BUREAU-REGION II National Geohazards Assessment and Mapping Program The DENR-MGB-Region II has been implementing its National Geohazards Assessment and Mapping Program since 2005 with the prima

Add to Reading List

Source URL: www.mgb2.com

Language: English - Date: 2015-11-02 22:07:35
357Information technology management / Information technology / Computing / Human resource management / Human resource management system / HRMS / Enterprise content management / Computer security

THE PST Project News ISSUE 1 December 22, 2010

Add to Reading List

Source URL: www.synergycentric.com.my

Language: English - Date: 2013-01-10 00:21:00
358Touro College / Clery Act / Murder of Jeanne Clery / Emergency management / Emergency communication system / New York / United States / Touro Law Center

Annual Security & Fire Safety Report 2015 Table of Contents NOTICE OF NONDISCRIMINATION ................................................................................. 1 OVERVIEW ......................................

Add to Reading List

Source URL: www.tuw.edu

Language: English - Date: 2016-06-07 14:57:09
359Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
360Hacking / World Wide Web / Cross-site scripting / Web server / Cult of the Dead Cow / Computing / Cyberwarfare / Information technology management

Security Announcement ― Cross-Site Scripting (XSS) Vulnerability in Embedded Web Server on MFPs/Printers Dear Customers, The vulnerability was found in the Embedded Web Server* installed in below MFPs and Printers. *No

Add to Reading List

Source URL: www.triumph-adler.de

Language: English - Date: 2014-11-27 04:15:07
UPDATE