Security Management

Results: 59084



#Item
791Nuclear technology / Emergency management / Disaster preparedness / EPR / Federal Emergency Management Agency / Nuclear safety and security / Preparedness

FELLOWSHIPS international.anl.gov/fellowships Emergency Preparedness and Response Helena Chuda is an emergency preparedness specialist. She has been working in the Emergency Response Center of the State Office for Nuclea

Add to Reading List

Source URL: international.anl.gov

Language: English - Date: 2016-07-08 18:49:26
792Cryptography / Computer architecture / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Virtual private networks / Layer 2 Tunneling Protocol / Root certificate / Certificate authority / Control Panel

Microsoft Word - L2TP Windows XP OR VISTA.doc

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:03
793Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
794Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Public key certificate / Certificate authority / Professional certification / Conveyancing / Information security

ARNECC Response to Draft v2 MOR Feedback

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:33
795Data security / Prevention / Security / Identity management / Law / Privacy / Information privacy / Internet privacy / Information security / San Jose State University

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:31:43
796Password / Security / Prevention / Computer security / Mainframe computer / Resource Access Control Facility / Z/OS / Identity management / Computing / Password manager / Password fatigue

Data Sheet Automated Sign-On for Mainframe Add-On for Host Access Management and Security Server Automated Sign-On for Mainframe Add-On

Add to Reading List

Source URL: www.attachmate.com

Language: English - Date: 2016-06-20 22:27:35
797Computing / Information technology / Data / Information systems / Information technology management / Records management technology / United States Department of Homeland Security / United States Department of Justice / Document management system / National Information Exchange Model / Database / Decision support system

aiSMARTBENCHâ„¢ Decision Support System Inspired by Judges, for Judges The First Decision Support System for Judges What Is a Decision Support System?

Add to Reading List

Source URL: www.mentistechnology.com

Language: English - Date: 2016-05-18 18:51:21
798Computing / Cloud computing / Cloud infrastructure / Cloud storage / File hosting service / Data security / Advanced Encryption Standard / Cloud computing security / IEEE Cloud Computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:45
799Cryptography / Key management / Applied mathematics / Cryptographic software / Symmetric-key algorithm / Cipher / Key size / Block cipher / Key / Public-key cryptography / Encryption / Data Encryption Standard

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
800Risk / Security / Military science / Prevention / Actuarial science / Management / Project management / Risk management / Operations order / Military operation plan / Safety

Cold Weather Risk Management Terminal Learning Objective Action: Apply the Risk Management (RM) process and principles to cold weather operations or training Condition: You are a small unit leader, in a training

Add to Reading List

Source URL: www.wainwright.army.mil

Language: English - Date: 2014-11-20 13:23:01
UPDATE