Security information management

Results: 13712



#Item
901Business / Security / Benchmarking / Strategic management / WFCA / Risk management / Risk / Management / Actuarial science / Ethics

The Business Owner Complimentary on-line publication PRACTICAL HOW-TO INFORMATION TO HELP YOU IMPROVE YOUR BUSINESS RIGHT NOW!

Add to Reading List

Source URL: www.wfca-pro.org

Language: English - Date: 2011-05-16 14:10:34
902Public safety / Comprehensive National Cybersecurity Initiative / United States Department of Homeland Security / Federal Information Security Management Act / National Cyber Security Division / Supply chain cyber security / Cyberwarfare / Security / Computer security

Cybersecurity: Securing Public Networks, Readying the Nation Congress must act on legislation that incentivizes information sharing, promotes secure IT systems,  and a skilled workforce to maintain the

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2015-04-09 15:16:02
903Technology / Crime prevention / National security / Hacking / Software testing / Vulnerability / Computer security / Personal computer / System administrator / Computing / Security / Information technology management

Best Practices Review Summary #02-09a O L AA OFFICE OF THE LEGISLATIVE AUDITOR

Add to Reading List

Source URL: www.auditor.leg.state.mn.us

Language: English - Date: 2002-04-25 14:55:24
904Management / Process management / Quality control / ESCM-SP / Access control / Capability-based security / Information technology management

CAPABILITY EXPENDITURE B.29[99c] SIXThe term “capability” can be used to embrace a number

Add to Reading List

Source URL: oag.govt.nz

Language: English - Date: 2014-04-29 00:45:24
905Administration / Public records / Accountability / Data / Records management / Information Lifecycle Management / Records manager / Information security / Document management system / Information technology management / Business / Content management systems

Records Management & Compliance: Making the Connection 28

Add to Reading List

Source URL: www.kahnconsultinginc.com

Language: English - Date: 2007-06-06 22:46:00
906Online chat / Computer-mediated communication / Internet protocols / Transport Layer Security / Presence information / XML namespace / BOSH / Computing / Cross-platform software / Extensible Messaging and Presence Protocol

XEP-0198: Stream Management Justin Karneges mailto: xmpp: Peter Saint-Andre

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:16:44
907Product safety / Quality / Quality management / Technology / Food and drink / Evaluation / Food / Food security / Food safety / Industrial engineering / Packaging

Class 2 Making Food Safety Your Business Information for Class 2 Food Businesses What do changes to the Food Act mean for your business? The Food Act 1984 regulates the sale of food for human

Add to Reading List

Source URL: www.portphillip.vic.gov.au

Language: English - Date: 2014-10-24 05:33:55
908Privacy / Computing / Social issues / Personal life / Personally identifiable information / Government / HTTP cookie / Privacy Office of the U.S. Department of Homeland Security / In re Gateway Learning Corp. / Ethics / Internet privacy / Identity management

Privacy Policy At Forever Love Foundation for Medical Aid to Thailand, a California non-profit corporation (referred to as "FLF," "us" or "we"), we recognize that your privacy is important. This Policy discloses the priv

Add to Reading List

Source URL: www.forever-love.or.th

Language: English - Date: 2013-11-09 08:21:06
909Computing / Computer network security / Cybercrime / Marketing / Spam / Email spam / Computer security / Social media / Anti-spam techniques / Internet / Spamming / Electronic commerce

Dept of Information Systems, Business Statistics and Operations Management Improving Internet Security Through Social Information and Social Comparison: A Field Quasi-Experiment

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2013-02-08 12:40:31
910Business / Financial institutions / Institutional investors / Additional insured / Insurance / Risk management information systems / Indemnity / Employee Retirement Income Security Act / Professional liability insurance / Types of insurance / Financial economics / Investment

Microsoft Word - IO-02 Iron-Starr Policy SPECIMEN.doc

Add to Reading List

Source URL: www.ironstarrexcess.com

Language: English - Date: 2014-10-01 10:00:17
UPDATE