and Security Technologies

Results: 1110



#Item
761Emerging technologies / Technology / Smart grid / Electric power distribution / Smart grid policy in the United States / Interoperability / Electrical grid / Electric Power Research Institute / IEEE Smart Grid / Energy / Electric power / Electric power transmission systems

Smart Grid Overview and Cyber Security October 23, 2009 Jim St Pierre Deputy Director Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-03 00:00:00
762Carbon dioxide / Carbon sequestration / Energy economics / Chemical engineering / Low-carbon economy / Carbon capture and storage / Natural gas / Carbon pricing / American Clean Energy and Security Act / Environment / Climate change policy / Climate change

4-5. Policy Options Gas GHG Reduction Technologies

Add to Reading List

Source URL: www.npc.org

Language: English - Date: 2011-12-08 12:18:10
763Information technology / Data security / Technology / Forensic science / Information and communication technologies in education / Information security / Public safety / Computer security / Security / Communication

POLICY & PROCEDURE NO: CM/ICT/9 CORPORATE MANAGEMENT – WHOLE INSTITUTE SUB SET – INFORMATION & COMMUNICATIONS TECHNOLOGY SUBJECT:

Add to Reading List

Source URL: www.institute.nhs.uk

Language: English - Date: 2010-04-21 09:41:58
764Crime prevention / Computer security / Data security / Biometrics / Information security / United States Army Forces Command / Physical security / Access control / United States Army Communications-Electronics Research /  Development and Engineering Center / Security / Public safety / National security

Microsoft Word - Volume 3 Labor Demand - Emerging Defense Technologies[removed]

Add to Reading List

Source URL: www.bracrtf.com

Language: English - Date: 2010-01-29 10:32:29
765Computing / Information technology management / Information security / Asset management / Asset / Security controls / TRAC / Information and communication technologies in education / Information Technology Infrastructure Library / Computer security / Data security / Security

POLICY & PROCEDURE NO: CM/ICT/8 CORPORATE MANAGEMENT – WHOLE INSTITUTE SUB SET – INFORMATION & COMMUNICATIONS TECHNOLOGY SUBJECT:

Add to Reading List

Source URL: www.institute.nhs.uk

Language: English - Date: 2010-04-21 09:43:16
766Poles / Canada–Russia relations / Canada–United States relations / Russia–United States relations / Arctic Ocean / Global Monitoring for Environment and Security / Satellite / Iceberg / Polar region / Physical geography / Extreme points of Earth / Arctic

THE CONTRIBUTION OF SPACE TECHNOLOGIES TO ARCTIC POLICY PRIORITIES INTRODUCTION

Add to Reading List

Source URL: www.polarview.org

Language: English - Date: 2013-07-23 03:39:53
767Computing / Botnets / Malware / Targeted threat / Storm botnet / Multi-agent systems / Computer network security / Spamming

WHITE PAPER Advanced Threat Protection Solution Understanding the technologies required to successfully combat Advanced Persistent Threats both inside and outside your network

Add to Reading List

Source URL: info.seculert.com

Language: English - Date: 2013-12-16 08:32:04
768Information technology management / Data security / Law / Privacy / Health informatics / Freedom of information legislation / Information Technology Infrastructure Library / Internet privacy / UK Academy for Information Systems / Technology / Ethics / Health

Government of Manitoba Enterprise Architecture Principles, Strategies and Directions Manitoba Information & Communications Technologies Department of Energy, Science & Technology

Add to Reading List

Source URL: www.gov.mb.ca

Language: English - Date: 2014-09-08 17:02:06
769Electric power transmission systems / Electric power distribution / Emerging technologies / Privacy / Smart grid / Smart meter / Telecommunications Industry Association / Electrical grid / FTC Fair Information Practice / Electric power / Energy / Technology

BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF OHIO IN THE MATTER OF THE REVIEW OF THE CONSUMER PRIVACY PROTECTION, CUSTOMER DATA ACCESS, AND CYBER SECURITY ISSUES ASSOCIATED WITH

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2014-07-15 12:55:29
770Cyberwarfare / Password / Cross-site scripting / Web application security / HTTP Secure / HTTP cookie / Login / Cross-site request forgery / HTTP Strict Transport Security / HTTP / Computing / Computer security

Securing Web Application Technologies (SWAT) CH E CKL I S T The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. It’s a

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-02-12 10:08:44
UPDATE