Security information management

Results: 13712



#Item
981Institutional Data Management Blueprint 1. Introduction Research data management has become an international topic of concern to researchers and their funders. Data integrity, validation and security, access, curation

Institutional Data Management Blueprint 1. Introduction Research data management has become an international topic of concern to researchers and their funders. Data integrity, validation and security, access, curation

Add to Reading List

Source URL: eprints.soton.ac.uk

Language: English - Date: 2011-09-05 11:13:47
982Secure4Audit (auditGUARD) A Technical White Paper NOTICE As auditGUARD is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information co

Secure4Audit (auditGUARD) A Technical White Paper NOTICE As auditGUARD is a software product which is subject to change, S4Software, Inc. reserves the right to make changes in the specifications and other information co

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2005-01-25 07:01:00
983Fundamental Limits	 
 on Information Security and Privacy

Fundamental Limits on Information Security and Privacy

Add to Reading List

Source URL: viterbi.usc.edu

Language: English - Date: 2015-03-27 03:02:27
984University of Nebraska Central Administration  Job Description General Information Working Job Title:

University of Nebraska Central Administration Job Description General Information Working Job Title:

Add to Reading List

Source URL: nebraska.edu

Language: English - Date: 2015-04-08 13:49:39
985NATIONAL CYBER SECURITY EXERCISE 2011 FINAL REPORT ISBN: January 2011

NATIONAL CYBER SECURITY EXERCISE 2011 FINAL REPORT ISBN: January 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-05-08 16:05:54
986Students, Faculty, and Staff Information Security Incident.pdf

Students, Faculty, and Staff Information Security Incident.pdf

Add to Reading List

Source URL: www4.csudh.edu

Language: English - Date: 2015-05-26 23:27:57
987Information Security: What the Market Wants and Why  Dan Geer  +

Information Security: What the Market Wants and Why Dan Geer +

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2008-06-16 16:41:04
988DATASHEET  Real-Time Security Events from IBM i Monitor Your Most Critical Data The IBM i OS runs some of the most critical business applications in your organization. PowerTech Interact™

DATASHEET Real-Time Security Events from IBM i Monitor Your Most Critical Data The IBM i OS runs some of the most critical business applications in your organization. PowerTech Interact™

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2013-07-15 08:41:14
989AIMDStandards for Internal Control in the Federal Government

AIMDStandards for Internal Control in the Federal Government

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2011-09-29 23:06:34
990ISAN User Guide  ISAN International Agency 26, rue de Saint Jean CH-1203 Geneva Switzerland

ISAN User Guide ISAN International Agency 26, rue de Saint Jean CH-1203 Geneva Switzerland

Add to Reading List

Source URL: www.pl.isan.org

Language: English - Date: 2013-10-15 05:40:08