Infrastructure Protection

Results: 5457



#Item
251EPCM / Real estate / Environment /  Health and Safety / Environmental impact assessment / Rio Tinto Alcan / Environmental protection / Infrastructure / Construction / Environment / Architecture

Section 25 Environmental Management Plan Alcan Gove Alumina Refinery Expansion Project Draft Environmental Impact Statement 25

Add to Reading List

Source URL: www.ntepa.nt.gov.au

Language: English - Date: 2013-01-09 22:19:08
252Law / Rape / Criminal law / Ages of consent in North America / National Information Infrastructure Protection Act / Abuse / Title 18 of the United States Code / Human sexuality

18 U.S.C. 1591 – as amended by Amendment 273 as revised on the floor. (a) Whoever knowingly— (1) in or affecting interstate or foreign commerce, or within the special maritime and territorial jurisdiction of the Unit

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2015-04-22 11:07:12
253Data security / Public safety / Agencies of the European Union / European Network and Information Security Agency / Information security / Critical infrastructure protection / National security / Security / Computer security

Technical Guideline on Incident Reporting Technical guidance on the incident reporting in Article 13a Version 2.1, October 2014 www.enisa.europa.eu

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-27 08:06:17
254Accountability / Cloud computing / Centralized computing / Cloud infrastructure

CPDP 2014, Brussels Accountability in Cloud Environments Computers, Privacy and Data Protection

Add to Reading List

Source URL: www.cpdp.be

Language: English - Date: 2014-06-17 04:28:42
255Cyberwarfare / Computer network security / Data security / Cyber security standards / Critical infrastructure protection / SCADA / RIPE / Vulnerability / North American Electric Reliability Corporation / Security / Computer security / National security

The RIPE Crosswalk Comparing the RIPE cyber security program to ICS security standards and frameworks Perry Pederson November 2014

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2014-11-06 03:38:57
256Right to Information Act / India / Article One of the Constitution of Georgia / National Information Infrastructure Protection Act / Freedom of information legislation / Law / Freedom of Information Act

Text of the FOIA (showing changes made with the OPEN Government Act of 2007)

Add to Reading List

Source URL: www.dod.gov

Language: English - Date: 2015-02-06 11:08:06
257Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
258United States Department of Homeland Security / Surveillance / Information Sharing Environment / Fusion center / Internet privacy / Critical infrastructure protection / Counter-terrorism / Emergency management / United States Intelligence Community / National security / Security / Government

National Strategy for Information Sharing

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:11:00
259National security / Concurrent computing / Computer security / Computer network security / Data security / Information security / Cloud computing / Data center / Password / Computing / Security / Crime prevention

Safeguarding Your Data Multiple Tiers of Protection LeanKit’s holistic security infrastructure and advanced security measures provide protection against physical, network, server, application, and data vulnerabilities.

Add to Reading List

Source URL: leankit.com

Language: English - Date: 2015-05-28 17:08:06
260System administration / Management / Backup / Continuous availability / Business continuity / High availability / Downtime / Incremental backup / Continuous data protection / Data security / Information technology management / Computing

System Business Continuity Classification Criticality Levels Core Infrastructure Critical

Add to Reading List

Source URL: infosec.missouri.edu

Language: English - Date: 2012-05-03 17:04:45
UPDATE