Security information management

Results: 13712



#Item
51Computing / Data management / Information science / Information / Data management plan / Data-intensive computing / Data center / Research data archiving / Data curation / Cloud computing security / Open data

Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011

Add to Reading List

Source URL: ssdbm2011.ssdbm.org

Language: English - Date: 2011-09-01 19:47:29
52Security / Cryptography / Computing / Prevention / Data security / Secure communication / Crime prevention / National security / Key management / Computer security / Data breach / SafeNet

For more information, please visit: 1 www.securethebreach.com

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
53Privacy / Economy / Business law / Human rights / Identity management / E-commerce / Law / Data security / Internet privacy / Information privacy / Medical privacy / Consumer privacy

Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper) Joan Feigenbaum1 , Michael J. Freedman2 , Tomas Sander3 , Adam Shostack4 1

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:48:34
54Information technology management / Computing / Information technology / Information / ITIL / International Atomic Energy Agency / Information system / Business process management / Project management / Data center / Business service management / Draft:ICT Security Policy System: A Case Study

Job Description for Professional Posts (P-100P)

Add to Reading List

Source URL: international.anl.gov

Language: English - Date: 2016-07-19 12:31:26
55Privacy / Government / Identity management / Law / Data security / Personally identifiable information / Internet privacy / Information privacy / Privacy law / Office of the Australian Information Commissioner

Privacy complaint formPrivacy and Data Protection Act 2014

Add to Reading List

Source URL: www.delwp.vic.gov.au

Language: English - Date: 2015-09-07 20:15:57
56Data security / Computing / Prevention / Government / Privacy / Identity documents / Personal life / Personally identifiable information / Identity management / Bii / Privacy Office of the U.S. Department of Homeland Security / Internet privacy

Version Number: U.S. Department of Commerce NOAA Privacy Impact Assessment

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-06-08 09:37:49
57Emergency management / Firefighting in the United States / Disaster preparedness / United States Department of Homeland Security / Incident management / National Response Framework / Incident Command System / Federal Emergency Management Agency / Crisis communication / Emergency management software

PUBLIC INFORMATION IN AN ALL-HAZARDS INCIDENT MGT -318 Texas A&M Engineering Extension Service National Emergency Response and Rescue Training Center

Add to Reading List

Source URL: www.scemd.org

Language: English - Date: 2016-05-04 08:14:26
58Marketing / Data management / Computing / Identity management / Data security / Advertising / Targeted advertising / Internet privacy / Personal /  Inc. / Touchpoint / Information privacy / Privacy

THE 4 PILLARS OF OUR data BREADTH Data breadth is vital; the more data sources the media owner

Add to Reading List

Source URL: mi9.com.au

Language: English - Date: 2016-06-29 01:11:28
59Government / Human rights / Security / Law / Identity management / Privacy / Information privacy / International Safe Harbor Privacy Principles / Telecommunications data retention

Proposed United States–United Kingdom Agreement on Secure and PrivacyProtective Exchange of Electronic Data for the Purposes of Countering Serious Crime, Including Terrorism Summary The Administration has been discussi

Add to Reading List

Source URL: www.netcaucus.org

Language: English - Date: 2016-07-22 18:36:18
60Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: nextlog.it

Language: English - Date: 2014-05-07 13:40:47
UPDATE