Automated information systems security

Results: 104



#Item
51Government procurement in the United States / United States administrative law / Risk management / Program management / National security / Data & Analysis Center for Software / Defense Integrated Military Human Resources System / Project management / Business / Management

GAO[removed]Highlights, MAJOR AUTOMATED INFORMATION SYSTEMS: Selected Defense Programs Need to Implement Key Acquisition Practices

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2013-03-28 13:24:48
52Law enforcement / Security / Law / Identification / Federal Bureau of Investigation / Computerized Criminal History / Interstate Identification Index / National Crime Information Center / Automated fingerprint identification / Criminal records / Biometrics / Fingerprints

Survey of State Criminal History Information Systems, 2001

Add to Reading List

Source URL: www.bjs.gov

Language: English - Date: 2009-09-01 16:21:34
53Military / Common Access Card / Defense Enrollment and Eligibility Reporting System / Real-Time Automated Personnel Identification System / Defense Information Systems Agency / Defense Technical Information Center / Defense Manpower Data Center / Under Secretary of Defense for Policy / Identity documents in the United States / United States Department of Defense / Government / Security

Directive-Type Memorandum (DTM[removed], December 1, 2008; Incorporating Change 5, October 8, 2013

Add to Reading List

Source URL: www.cac.mil

Language: English
54Surveillance / Crime prevention / Automatic number plate recognition / Vehicle registration plate / Police / Sheriffs in the United States / Criminal record / Toll road / Freedom of information legislation / Security / Law enforcement / National security

Automated License Plate Recognition Systems Meeting Minutes

Add to Reading List

Source URL: www.state.me.us

Language: English - Date: 2010-11-18 10:10:06
55Open standards / Network management / Security Assertion Markup Language / Provisioning / Common Information Model / Information model / XML / XACML / Distributed Management Task Force / Computing / Identity management / Standards organizations

Brainstorming Session Ideas -Getting out of a centralized system, but having seamless interoperable way for provisioning among many systems -o Open automated interface to manage accounts

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-10-03 21:44:26
56Public safety / Regional Information Sharing Systems / United States Computer Emergency Readiness Team / Cyberwarfare / Critical infrastructure / National Communications System / Rajshekhar Murthy / United States Department of Homeland Security / National security / Government

INFORMATION SHARING SITES There are numerous Web sites related to information sharing. These sites may require a user name and password, registration for which is available at each site. The Automated Critical Asset Mana

Add to Reading List

Source URL: cias.utsa.edu

Language: English - Date: 2014-02-26 09:50:56
57Public records / Records management / Biometrics / Business / Security / Accountability / Content management systems / Administration / Information technology management

Automated Biometric Indentification System (ABIS)

Add to Reading List

Source URL: www.archives.gov

Language: English - Date: 2014-06-18 15:36:24
58Document management systems / Technology / Content management systems / Workflow / Enterprise resource planning / Business process management / EDM / Information technology management / Business / Management

AUTOMATED MANAGEMENT FOR BUSINESS PROCESS IN MUNICIPALITIES INCREASE EFFICIENCY OF YOUR ORGANIZATION BY AUTOMATING MUNICIPALITIES SECURITY

Add to Reading List

Source URL: www.integrim.com

Language: English - Date: 2013-11-11 15:22:03
59Backup / Database administrator / Reliability engineering / Information systems / Systems engineering / Education / Systems science / Data security / Data management / Grade retention

INFORMATION SYSTEMS AND TECHNOLOGY[removed]The Information Systems and Technology Section includes records relating to the planning, development, maintenance and operation of automated information systems. This inclu

Add to Reading List

Source URL: www.saskarchives.com

Language: English - Date: 2012-02-01 11:05:13
60Finance / EMV / Debit card / Smart card / Payment card / Interac / Automated teller machine / Card security code / MasterCard / Payment systems / Business / Money

For acquirers, effective end-to-end event management should entail: — S haring information about known security vulnerabilities of software and payment devices that have led to past data compromises

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2010-11-11 01:11:53
UPDATE