Security information management

Results: 13712



#Item
81Security / Economy / Business / Crime prevention / Chief information security officer / CIO magazine / Physical security / Surveillance / Senior management / Corporate title / Computer security / Security guard

Press Contact Joran Thompson CIO & CISO Summit France: CALL FOR SPEAKERS

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-01-29 13:14:10
82Data security / Privacy / East Coast of the United States / Data management / Computing / Eastern United States / Connecticut State Department of Education / Connecticut / Personal /  Inc. / Personally identifiable information / Data Protection Act / Telecommunications (Interception and Access) Amendment (Data Retention) Act

Sec. 10-3a pageState Department of Education TABLE OF CONTENTS

Add to Reading List

Source URL: www.sde.ct.gov

Language: English - Date: 2012-05-10 14:41:04
83Data security / Computing / Prevention / Government / Privacy / Identity management / Personal life / Personally identifiable information / Privacy Office of the U.S. Department of Homeland Security / Internet privacy / Bii / Information security

Version Number: U.S. Department of Commerce National Oceanic and Atmospheric Administration Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2016-07-27 11:07:40
84Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
85Computing / Data security / Computer security / Data remanence / Identification / Information / Automatic identification and data capture / Records management technology / Barcodes / Sanitization / Degaussing / Form

NFREQUEST #: DATE: NOAA FORM 37-45

Add to Reading List

Source URL: www.pps.noaa.gov

Language: English - Date: 2015-09-08 08:54:07
86Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-08-05 21:36:39
87Internet privacy / Computing / Privacy / Identity management / Technology / Personally identifiable information / Gmail / Medical privacy / Computer security / HTTP cookie / ViaSat / Anonymity

WildBlue Communications, Inc. – Subscriber Privacy Policy This Privacy Policy covers all web sites under the wildblue.net domain (such as www.wildblue.net and help.wildblue.net) and applies to all current and former c

Add to Reading List

Source URL: www.orderwirelessinternet.com

Language: English - Date: 2013-01-04 20:30:45
88Security / Prevention / Identity management / Law / Privacy / Milind Tambe / Internet privacy / Computer security / Mathematical optimization / Resilient control systems

7th Conference on Decision and Game Theory for Security – GameSec 2016 New York, NY, USA Recent advances in information and communication technologies pose significant security challenges that impact all aspects of mod

Add to Reading List

Source URL: www.gamesec-conf.org

Language: English - Date: 2016-08-07 16:15:36
89Computing / Qualys / Computer security / Payment Card Industry Data Security Standard / Information technology / SAQ / Cloud computing security / Regulatory compliance / Questionnaire / Business process management / Cloud computing

SAQ SECURITY ASSESSMENT QUESTIONNAIRE Assess Business Risk with Automated Campaigns

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-02-29 14:52:30
90Privacy / Identity management / Data security / Law / Internet privacy / Information privacy / Computing / Government / Personally identifiable information / Medical privacy / Privacy concerns with social networking services / P3P

Protecting the Privacy of Displayed Information Peter Tarasewich, Jun Gong, Richard Conlan HCI Laboratory, College of Computer & Information Science, Northeastern University 360 Huntington Avenue, 202 WVH, Boston, MA 021

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 18:53:37
UPDATE