Back to Results
First PageMeta Content
Cyberwarfare / Information security / Risk management framework / Security controls / Business continuity / Vulnerability / Security Content Automation Protocol / Federal Information Security Management Act / Information security management system / Computer security / Data security / Security


Monitor - Tips and Techniques for Systems
Add to Reading List

Document Date: 2009-05-13 01:00:00


Open Document

File Size: 345,18 KB

Share Result on Facebook

Company

Federal Information Systems / /

Event

Person Communication and Meetings / /

IndustryTerm

configuration management / individual information systems / approved information system / organization-specific tools / information technology components / /

Position

owner and authorizing official / official / senior agency information security officer / senior agency information security officer / and the risk executive / authorizing official and the senior agency information security officer / authorizing official / senior agency information security officer / senior agency information security officer / senior agency information security officer and the risk executive / authorizing official / /

Technology

information technology / /

SocialTag