Security information management

Results: 13712



#Item
951Computing / Privacy / Data security / Social issues / Email / Personally identifiable information / Internet privacy / Information security / National Oceanic and Atmospheric Administration / Security / Ethics / Identity management

Microsoft Word - PIA_NOAA6101_2011_approvedbyDOC_102811

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2012-12-21 08:04:11
952Directory information tree / Hierarchy / Directory service / Computer security / Database / E-Government / Structure / Identity management / Identity / Computing

World Leading Discovery Technology White Paper: Machinery of Government Identity Management and XML Directory Services Solutions

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 01:01:21
953Risk / Risk analysis / Information Risk Management / IT risk management / Consumerization / Information security management system / IT risk / Risk management / European Network and Information Security Agency / Data security / Computer security / Security

Consumerization of IT: Risk Mitigation Strategies Responding to the Emerging Threat Environment [Deliverable – ] Consumerization of IT: Risk Mitigation Strategies

Add to Reading List

Source URL: security.polito.it

Language: English - Date: 2013-01-06 12:28:51
954Public safety / Risk / Computer security / Data security / Risk management / Corporate title / Information security / Management / Actuarial science / Security

Shared Assessments Summit 2015 Third Party Risk Assurance: Everything Old is New Again Wednesday, April 29, Thursday, April 30, 2015 Four Seasons Hotel – Baltimore Day 1: Wednesday, April 29, 2015

Add to Reading List

Source URL: sharedassessments.org

Language: English - Date: 2015-05-05 11:24:25
955Data security / Information security management system / Infrastructure

TAM Self Assessment - for classroom use.pdf

Add to Reading List

Source URL: www.fhwa.dot.gov

Language: English - Date: 2015-04-15 13:15:40
956Information technology management / Data management / Data security / Crime prevention / National security / Backup / Database / Computer security / Encryption / Security / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: www.vsysone.com

Language: English
957Database / Computing / Information technology management / Data / NetVault Backup / Backup software / Backup / Data security

District Photo Standardizes on CommVault and Nimble Storage Integrated Solution for Backup Management Customer Challenges District Photo relies on their IT infrastructure to keep up with growth. District Photo’s boomin

Add to Reading List

Source URL: info.nimblestorage.com

Language: English - Date: 2015-05-24 20:20:56
958National security / Public safety / Data security / Information security / Role-based access control / Vulnerability / User provisioning software / Identity management / Security / Computer security / Crime prevention

Microsoft Word - FinCom2007fpost.doc

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:13
959Product lifecycle management / AutoCAD / Asbestos / Hazard / Security / Software / Computer-aided design / 3D graphics software / Information technology management

Product Datasheet HAZARD for AssetCapture TM “Intelligent CAD Files

Add to Reading List

Source URL: www.cadcap.com

Language: English - Date: 2011-11-10 06:40:17
960Security / Cyberwarfare / Crime prevention / National security / Penetration test / Quality assurance / Vulnerability / Information security / Application security / Software testing / Computer security / Computer network security

What makes Ambersail different? Our testing process is based upon experience. Not just of information security, but of years spent in software development, network management and operations

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
UPDATE