Security information management

Results: 13712



#Item
231Computer network security / Computing / Cyberwarfare / DMZ / Firewall / Information technology management

CyberGuard SG Firewall VPN Appliance User Manual RevisionJune 7, 2004

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2004-06-25 01:25:36
232Privacy / Information privacy / Data security / Data protection / Information technology / Information / Cybercrime / Data Protection Act / Personally identifiable information / Records management / Information privacy law

DATA PROTECTION CODE OF PRACTICE ON ARCHIVAL INFORMATION March 2010 Contents

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2011-03-10 08:13:18
233Identity documents / Crime / Misconduct / Security engineering / Fraud / Identity theft / Identity management / Identity Theft Resource Center / Identity fraud / Anti-theft system / Personally identifiable information / Internet privacy

DOC Document

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:19
234NetOps / Military communications / LandWarNet / Interoperability / Computing / Technology / Military

Cryptographic Management Cryptographic Security Services are measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications.

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:02:18
235SarbanesOxley Act / Accounting / Computer security / Auditing / Risk / International standards / Standards / Professional studies / OMB Circular A-123 / SSAE 16 / Federal Information Security Management Act / Internal control

Date: July 22, 2016 In reply refer to:

Add to Reading List

Source URL: nfc.usda.gov

Language: English - Date: 2016-07-25 15:31:39
236Economy / Business / Management / Human resource management / Senior management / CIO magazine / Information system / Corporate title / Chief information security officer

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-04-20 12:35:07
237Information technology management / Information technology / Law / Software engineering / Regulatory compliance / Requirement / Payment Card Industry Data Security Standard / Business process management / Health Insurance Portability and Accountability Act / Compliance and ethics program / Governance /  risk management /  and compliance

Compliance at Velocity Copyright © 2016 Chef Software, Inc. http://www.chef.io

Add to Reading List

Source URL: pages.chef.io

Language: English - Date: 2016-07-29 16:22:06
238Data security / Identity management / Law / Privacy / Medical privacy / Singapore / Personally identifiable information / Internet privacy

British Council 30 Napier Road SingaporeT: +F: +www.britishcouncil.sg

Add to Reading List

Source URL: www.mlaw.gov.sg

Language: English - Date: 2016-04-27 03:52:30
239Identity management / Law / Privacy / Internet privacy / Medical privacy / Website / World Wide Web / P3P

Internet Privacy Policy Gulf Coast Community Foundation (“Gulf Coast”) is committed to maintaining the confidentiality, integrity and security of personal information entrusted to us by current donors; potential don

Add to Reading List

Source URL: www.gulfcoastcf.org

Language: English - Date: 2015-12-15 09:19:19
240IEEE standards / Management / Information systems / Security / Human resource management / Human resource management system / Request for proposal / Project management / Risk management / Business continuity planning / Business process modeling / Systems engineering

Base Period: Date of IAA award through 24 months1 0001 Project management and implementation of IFMS/HRIS services: Development, implementation, and integration services, and Data migration;

Add to Reading List

Source URL: www.fai.gov

Language: English - Date: 2015-04-20 14:59:33
UPDATE