Security information management

Results: 13712



#Item
301Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
302Computer network security / Crime prevention / Cryptography / Information governance / National security / Check Point / Computer security / BigFix Inc

Check Point Smart Management Suite | Datasheet

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-03-16 15:49:01
303Occupational safety and health / Manufacturing / Mining / Emergency management / Information security

PRODUCTIVE SECTOR MANUFACTURING PDNA GUIDELINES VOLUME B

Add to Reading List

Source URL: www.recoveryplatform.org

Language: English - Date: 2015-11-24 01:08:34
304Information technology management / Outsourcing / Customer experience management / Help desk / ITIL / Service-level agreement / University of New Mexico / Customer support / Oracle Database / Computer security incident management / Service / Technical support

Datacenter, Database Hosting

Add to Reading List

Source URL: it.unm.edu

Language: English - Date: 2016-06-02 14:41:34
305Data management / Data security / Personal /  Inc. / Avatar / Form / Website

2014 IEEE Joint Intelligence and Security Informatics Conference A Service-independent Model for Linking Online User Profile Information Matthew Edwards Awais Rashid Paul Rayson Security Lancaster, School of Computing

Add to Reading List

Source URL: xn--bta-yla.net

Language: English - Date: 2014-12-31 11:24:35
306Accountability / Freedom of information laws by country / Government information / Privacy / United States corporate law / National Security Agency / Internet privacy / Records management / Email / Public records / Outlook.com

REQUEST UNDER THE NEW YORK FREEDOM OF INFORMATION LAW March 30, 2016 Records Access Officer Office of the Attorney General The Capitol Albany, NY 12224

Add to Reading List

Source URL: eelegal.org

Language: English - Date: 2016-04-28 13:02:57
307Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / SharePoint / Computer security

IT ACCEPTABLE USE POLICY PURPOSE The purpose of the Acceptable Use Policy for Brock University’s Information Technology (IT) systems is to protect the University, our students and employees from potential harm resultin

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:53
308Data security / Information Systems Security Association / Professional certification / Nonprofit organization / Professional Petroleum Data Management Association / World Institute for Nuclear Security

Information Security Vendors Association (ISVA)

Add to Reading List

Source URL: www.isva-global.org

Language: English - Date: 2013-04-04 11:41:29
309Information technology management / Security / Data security / IT risk management / Risk analysis / IT risk / ISO 31000 / ISO/IEC 27000-series / ISO/IEC 20000 / ISO/IEC 27001:2013 / Risk management / Professional certification

Neue Subnorm ISOfür Risikomanagement

Add to Reading List

Source URL: sk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:36
310Actuarial science / Risk / Project management / Security / Probability / Social vulnerability

RIMMA - Interdisciplinary CODATA Workshop on 1 RISK Information Management, Risk Models and Applications Berlin, Germany, November 17/18, 2014

Add to Reading List

Source URL: rimma2014.net

Language: English - Date: 2014-10-26 12:07:36
UPDATE