Security information management

Results: 13712



#Item
941Identity document / Authentication / Identity management / Information Technology Infrastructure Library / Identity score / Security / Identity / Cryptography

Microsoft Word 620529DB - Information for the State Sector.doc

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-01-31 16:09:34
942Cyberwarfare / Electronic commerce / Webroot Software / Threat / Security information and event management / Computer network security / Computer security / Security

PRODUCT OVERVIEW LogRhythm and Webroot: Integrated Security and Threat Intelligence Combining actionable threat data with advanced behavioral analytics for enterprise security intelligence

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2015-01-16 11:10:09
943Computing / Data security / Backup / Digital preservation / Data center / Metadata / Data management plan / Data mining / Data management / Information / Data

‘Incremental’: A pilot study for Supporting Research Data Management

Add to Reading List

Source URL: www.lib.cam.ac.uk

Language: English - Date: 2012-10-12 03:39:01
944Computer network security / Cyberwarfare / Crime prevention / National security / Security information and event management / Information security / Threat / Database security / Data breach / Security / Computer security / Data security

Report Needle in a Datastack Report Report

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-05 13:31:27
945Cartography / Science / Geospatial metadata / Metadata / Geographic information system / Geospatial analysis / Geographic information systems in geospatial intelligence / Pennsylvania Spatial Data Access / Data management / Information / Data

Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 22:58:52
946Risk / Information technology management / Certified Information Security Manager / Computer-aided audit tools / Internal audit / Audit / External auditor / Information technology audit process / Information Systems Audit and Control Association / Auditing / Information technology audit / Accountancy

ASSISTANT INFORMATION SYSTEMS AUDITOR – HR/AISAReporting to the Information Systems Auditor, the holder will undertake reviews of the NKCC’s ICT infrastructure and provide assurance to management on the a

Add to Reading List

Source URL: newkcc.co.ke

Language: English - Date: 2015-02-10 12:33:55
947Information systems / Computer security / Access control / Authorization / Human resource management system / Internet privacy / Electronic human resources / HRHIS / Human resource management / Security / Management

Virginia Polytechnic Institute and State University NoRev.: 3

Add to Reading List

Source URL: www.policies.vt.edu

Language: English - Date: 2013-08-06 11:47:17
948Backup / Data security / Solid-state drive / Database / IOPS / RAID / Computing / System software / Information technology management

VMW_09Q1_LGO_VMwareReady_Meta

Add to Reading List

Source URL: info.nimblestorage.com

Language: English - Date: 2015-05-23 20:19:11
949Management / Education / Certified Information Systems Security Professional / Professional certification / Risk / Data security / Ethics / Standards

      Shared  Assessments  Program   Certified  Third  Party  Risk  Professional  (CTPRP)  

Add to Reading List

Source URL: sharedassessments.org

Language: English - Date: 2014-11-11 12:16:37
950Computer network security / Crime prevention / National security / Health Insurance Portability and Accountability Act / Privacy law / Identity management / Privileged Identity Management / Data security / Web Access Management / Computer security / Security / Computing

SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-10-24 14:46:56
UPDATE