Security Management

Results: 59084



#Item
641Identity management / Data security / Law / Privacy / Neelie Kroes / Computing / Personal /  Inc. / Medical privacy / Information technology / Politics of the Netherlands / Fraunhofer Institute for Open Communication Systems

Exclusive panel on Identity Management, Privacy and Security Achieves Success at the World Economic Forum Meeting in Davos 2014 Geneva 28th January, 2014 – At the roundtable on Addressing Identity of People and Things,

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-01-30 13:49:03
642Water / Geography of Europe / Natural environment / United Nations Development Programme / Border rivers / Water security / Environmentalism / International Commission for the Protection of the Danube River / Integrated water resources management / World Water Day / Global Water Partnership / Sava

The post-2015 development agenda Slovenia stakeholder perspectives on a water goal and its implementation

Add to Reading List

Source URL: www.gwp.org

Language: English - Date: 2014-06-09 11:33:09
643Government / United States Department of Homeland Security / Emergency management / Homeland Security Centers of Excellence / Surveillance / War on Terror / University of Alaska Anchorage / Domain Awareness Center / Arctic / University of Alaska system / United States Coast Guard

UNIVERSITY of ALASKA ANCHORAGE Arctic Domain Awareness Center DHS Center of Excellence (COE) Project Work Plan

Add to Reading List

Source URL: adac.uaa.alaska.edu

Language: English - Date: 2016-04-22 00:41:57
644Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Computer security / Public key certificate / Conveyancing / Professional certification / Accreditation / Certificate authority / Information security

Electronic Conveyancing National Law (Victoria) Operating Requirements Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:03:52
645Computing / Computer network security / Computer security / Cyberwarfare / Computer networking / Firewall / Router / Proxy server / Computer network / Denial-of-service attack / Network security / Networking hardware

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-03-03 02:57:15
646Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
647Computing / Computer access control / Computer security / Directory services / Federated identity / Internet Standards / Identity management / Lightweight Directory Access Protocol / Shibboleth / Electronic authentication / Authentication / HTTP cookie

PAPI and LDAP Using directories for local authentication and authorization Diego R. López

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
648Auctions / Auction theory / Game theory / Business / Marketing / Auction / Bidding / English auction / Mineral Leasing Act / Online auction / Federal Lands Jobs and Energy Security Act / Tim DeChristopher

Bureau of Land Management Eastern States Office

Add to Reading List

Source URL: www.blm.gov

Language: English - Date: 2016-08-21 20:36:41
649Risk / Prevention / Safety / Disaster preparedness / Emergency management / Security / Vulnerability / Humanitarian aid / Social vulnerability / Disaster risk reduction / Vulnerability index / United Nations International Strategy for Disaster Reduction

State-of-the-Art and Definitions The following section gives a brief overview of other approaches in the field, focusing on disaster risk at the global or regional level. The overview of selected current approaches also

Add to Reading List

Source URL: www.worldriskreport.org

Language: English - Date: 2015-11-13 06:34:30
650Economy / Finance / Money / Treasury International Capital / Financial crises / World economy / Economy of the United States / Great Recession / U.S. Securities and Exchange Commission / United States Treasury security / Long-Term Capital Management / Federal Reserve System

Microsoft Word - ifdp1113.docx

Add to Reading List

Source URL: www.federalreserve.gov

Language: English - Date: 2015-03-23 16:03:08
UPDATE