Security information management

Results: 13712



#Item
331Network management / System administration / Crime prevention / National security / Secure communication / Logfile / Login / Syslog / Computer security / Security information and event management / Log analysis / Windows Security Log

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:43:06
332Computer security / Security / Identity management / Public housing in the United States / United States Department of Housing and Urban Development / Urban planning in the United States / Password / Hud / Information security / User / Computer security incident management

Microsoft Word - Updated EIV MF Coordinator Access Authorization Form FINALdoc

Add to Reading List

Source URL: www.hud.gov

Language: English - Date: 2008-05-13 13:31:56
333Privacy / Identity management / Law / Internet privacy / Confidentiality / Personally identifiable information / Medical privacy / Patriot Act / GrammLeachBliley Act

Privacy Notice We recognize the importance of protecting our clients’ privacy. We have policies to maintain the confidentiality and security of your nonpublic personal information. The following is designed to help you

Add to Reading List

Source URL: www.soundmindfp.com

Language: English - Date: 2014-12-24 10:29:34
334Computer access control / Password / Security / Login / Outlook.com / Educational technology / Form / CourseWork Course Management System

Instructor Registration and Login Information Log in and organize. Lecture and assess. Helpful resources are just a click away. STEP 1: Register

Add to Reading List

Source URL: media.pearsoncmg.com

Language: English - Date: 2008-12-29 18:31:29
335Cyberwarfare / Communications in the Republic of Ireland / Information technology management / Telecommunications in the Republic of Ireland / Surveillance / National Cyber Security Centre / NCSC / Computer emergency response team

Operational Framework NCSC-NL v0 2

Add to Reading List

Source URL: www.ncsc.nl

Language: English - Date: 2013-12-16 07:53:06
336Computer network security / Computer security / AlienVault / OSSIM / Cyberwarfare / Data security / Cryptography / Security information and event management / Unix / Vulnerability / Threat

UNIX AS A SECOND LANGUAGE By Sandra Henry-Stocker TOOLS Learning AlienVault ITworld | November 2, 2014

Add to Reading List

Source URL: www.alienvault.com

Language: English - Date: 2016-01-25 18:50:34
337

PRESSEAUSSENDUNG Terminvorschau: Österreichs größter Event für IT-Security- & Service-Management „4. Information-Security-Symposium“ mit Pionier-Themen: ISO-Standards für die IT Das „4. Information-Security-S

Add to Reading List

Source URL: ch.cis-cert.com

Language: German - Date: 2014-01-21 07:36:19
    338Privacy / Identity management / Digital rights / Human rights / Privacy engineering / Security engineering / Internet privacy / Medical privacy / Information privacy / Privacy Impact Assessment

    Privacy by Design-Engineering Privacy Workshop 3 Report Executive Summary Within the last few years, privacy experts in industry, government and academia have called for new thinking that enables engineering privacy into

    Add to Reading List

    Source URL: cra.org

    Language: English - Date: 2015-12-30 13:06:46
    339Privacy / Data security / Identity management / Personal life / Personally identifiable information / Internet privacy / Medical privacy / Information privacy / Privacy policy

    UC Irvine Privacy Impact Assessment The University has obligations to protect Personally Identifiable Information (PII) under state and federal laws and UC policies and values. PII is defined as any information that desc

    Add to Reading List

    Source URL: security.uci.edu

    Language: English - Date: 2016-02-23 19:33:16
    340Crime prevention / Cryptography / Information governance / National security / Computer security / Government procurement in the United States / IT service management / Short Message Service / Information security / Federal Information Security Management Act / Requirement

    Instructions for Completing the NOAALink Worksheet The NOAALink worksheet is the first step in initiating a request with NOAALink. Required fields will be noted within the worksheet; you will not be able to submit the w

    Add to Reading List

    Source URL: cio.noaa.gov

    Language: English - Date: 2016-05-03 10:56:14
    UPDATE