Security information management

Results: 13712



#Item
151Security / Computing / Crime prevention / Cryptography / Information governance / National security / Database / Computer security / Data mining / Clinical decision support system

Indexing Overview Chrysalis Data Solutions and Services Inc. (CDSS) provide high-quality data extraction and indexing to support contract management.

Add to Reading List

Source URL: www.chrysalisdss.com

Language: English - Date: 2016-06-11 05:26:30
152Contract law / Computing / Data management / Data security / Personal /  Inc. / Terms of service / Email / Information technology / Internet / Social networking services

Terms and Conditions for Rendity GmbH Rendity GmbH, headquartered in Vienna (hereinafter also known as “Rendity”), operates a crowd-investing platform for real estate projects under the domain “rendity.com” (here

Add to Reading List

Source URL: rendity.com

Language: English - Date: 2015-10-10 10:12:41
153Computing / Cloud computing / Computer security / Cloud infrastructure / Cloud storage / Data security / Cloud computing security / Information security / Cloud Security Alliance / Data center / Cloud computing issues / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:59
154Computing / Data management / Communications protocol / Data transmission / Computer networking / Data / Computer security / Telecommunications engineering / Data center / Information security

University of New Mexico IT Network Design Recommendations Fall, 2012 Prepared by:

Add to Reading List

Source URL: cio.unm.edu

Language: English
155Business / Corporate governance / Management / Structure / Professional studies / Data security / Information Systems Security Association / Board of directors / Quorum / Public Interest Declassification Board / Military Order of the Dragon

BYLAWS OF THE CAPITOL OF TEXAS CHAPTER OF THE INFORMATION SYSTEMS SECURITY ASSOCIATION, INC. ARTICLE I NAME

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-09-09 21:00:24
156Cryptography / Public-key cryptography / E-commerce / Public key infrastructure / Key management / Computer security / Public key certificate / SOA Security

information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:18:27
157Information technology management / Corporate Governance of ICT / Information technology governance / Information and communication technologies for development / Information and communications technology / Computing / Ministry of Communications and Information Technology / Draft:ICT Security Policy System: A Case Study

Organizational Unit Functions of the Division National ICT Governance – Policies and Standards Development (PSD) 1. Manage the development/updating, adoption, implementation and

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:58
158Data security / Data management / Privacy / Identity management / Computing / Medical privacy / Internet privacy / Personally identifiable information / Personal /  Inc. / Information technology

CASE STUDY Mydex enables individuals to exchange personal data with Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-04-22 08:00:52
159Computing / Information technology / System administration / Data security / Cloud infrastructure / Computer data / Information technology management / Sumo Logic / Cloud computing / Amazon Web Services / Big data / Logic Pro

CASE STUDY Greenhouse Software Greenhouse Software Recruits Top Candidates with Powerful Log Data Performance Organization

Add to Reading List

Source URL: www.sumologic.com

Language: English - Date: 2016-06-13 14:50:22
160Employment / Recruitment / Business / Human resource management / Background check / Law enforcement / Security / Workforce Innovation and Opportunity Act / Social security in Australia / Personal life

Valmiera Training Application Applicant Information Last Name First Name

Add to Reading List

Source URL: region9wib.org

Language: English - Date: 2016-05-12 15:58:49
UPDATE