Security Management

Results: 59084



#Item
691Government / Emergency management / United States administrative law / Paperwork Reduction Act / Privacy Act / Federal Register / Privacy Office of the U.S. Department of Homeland Security / United States / Federal Emergency Management Agency / Privacy

Federal Register / Vol. 80, NoThursday, October 29, Notices applications, the disclosure of which would constitute a clearly unwarranted

Add to Reading List

Source URL: www.indianaffairs.gov

Language: English - Date: 2016-07-11 18:47:26
692Computer security / Security / Prevention / Data security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Controlled Unclassified Information / NIST Cybersecurity Framework / Regulatory compliance / Information security

An Introduction to NIST Special Publicationfor Higher Education Institutions

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-18 11:38:08
693Performance management / CVSS / Computer network security

D1.1.1 Project Management Handbook

Add to Reading List

Source URL: wikirate.eu

Language: English - Date: 2016-07-01 06:37:58
694Software engineering / Computer programming / Computing / Subroutines / Computer security / Software bugs / Memory management / Return-oriented programming / Control-flow integrity / Control flow / Call stack / Gadget

2015 IEEE Trustcom/BigDataSE/ISPA Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2016-04-22 03:46:05
695Computing / Software / Security / Identity management / Law / Privacy / Internet privacy / Ubiquitous computing / Usability / Information privacy / Ambient intelligence / Medical privacy

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
696Safety / Prevention / Chemical safety / Occupational safety and health / Security / Environmental law / Industrial hygiene / Safety engineering / Emergency management / Dangerous goods / United Nations Security Council Resolution / Computer security

COMPREHENSIVE REVIEW OF CHEMICAL SAFETY AND SECURITY IN UKRAINE (WITHIN THE CONTEXT OF THE INTEGRATED CHEMICAL SAFETY AND SECURITY PROGRAM IN UKRAINE) Enhancing Ukrainian and international co-operation in the prevention,

Add to Reading List

Source URL: www.iccss.eu

Language: English - Date: 2015-07-06 06:51:04
697Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Software project management / Computer security / Abuse case / Vulnerability / Andreas Lothe Opdahl

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: , Volume 3, Issue 2, March – April 2014 ISSNMea

Add to Reading List

Source URL: www.ijettcs.org

Language: English - Date: 2014-05-13 04:33:09
698Computing / Security / Cryptography / Data security / Information governance / Computer network security / Key management / Computer security / Apache Accumulo / Cloud computing security

Transitions A ROUNDUP OF LINCOLN LABORATORY TECHNOLOGY TRANSFER OPPORTUNITIES IN CYBER SECURITY Technology Transfer

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:25:15
699Emergency management / Safety / Prevention / Disaster preparedness / Humanitarian aid / Occupational safety and health / Resilience

2015 Review The Asian Event Dedicated to Homeland and Civil Security  In a market with strong needs in security matters, ASIA PACIFIC HOMELAND SECURITY (APHS) responds to the expectations of governments, critical busi

Add to Reading List

Source URL: www.aphs.sg

Language: English - Date: 2016-05-20 11:10:30
700Risk / Actuarial science / Safety / Prevention / Health informatics / Security / Risk management / Integrating the Healthcare Enterprise

Integrating the Healthcare Enterprise 5 Cookbook: Preparing the IHE Profile Security Section

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2008-11-12 17:09:06
UPDATE