Data Access Manager

Results: 119



#Item
101Information technology management / Computing / Microsoft Office PerformancePoint Server / Document management systems / Microsoft SharePoint / Dashboard / Computer-aided dispatch / SharePoint Dashboard / The Access Group / Business intelligence / Data management / Business

Citizen Service Platform (CSP) Kevin Lasitz - VP, Global Business Development Alberto Gemin - Practice Manager, GOV & CRM Intranet Sites City of Brampton

Add to Reading List

Source URL: www.gobiernofacil.go.cr

Language: English - Date: 2010-12-03 12:38:05
102Information technology management / Computing / Microsoft Office PerformancePoint Server / Document management systems / Microsoft SharePoint / Dashboard / Computer-aided dispatch / SharePoint Dashboard / The Access Group / Business intelligence / Data management / Business

Citizen Service Platform (CSP) Kevin Lasitz - VP, Global Business Development Alberto Gemin - Practice Manager, GOV & CRM Intranet Sites City of Brampton

Add to Reading List

Source URL: www.gobiernofacil.go.cr

Language: English - Date: 2010-12-03 12:38:05
103Access control / Health Insurance Portability and Accountability Act / Identity management systems / Data security / Password manager / Password strength / Security / Computer security / Password

Local Health Operations Table of Contents

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-09-05 14:38:00
104Computer security / Antivirus software / Backup software / Proprietary software / Cyber-Ark / Norton 360 / Symantec / Software / Computing

Symantec™ Control Compliance Suite Virtualization Security Manager Seamless security management across a converged infrastructure Data Sheet: IT Risk and Compliance Can you: • Control access to your virtual environme

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2012-10-08 20:16:06
105Telecommunications data retention / KeePass / Data security / Password manager / Jumbleme / Software / Cryptographic software / Password

Data Protection Roadshow – 18 April 2012 Questions and Answers 1. Can a third party ask for someone else’s personal information under the Subject Access Request process (Data Protection Act 1998)? No, the subject acc

Add to Reading List

Source URL: www.kcl.ac.uk

Language: English - Date: 2012-05-31 06:21:13
106Identity management systems / Computer security / Identity management / Security Assertion Markup Language / SAML 2.0 / Active Directory / Lightweight Directory Access Protocol / System software / Computing / Directory services

P R O D U C T DATA S H E E T AsureSpace(TM) Meeting Room Manager or Resource Scheduler OneLogin’s Plan for Asure Software enables firms to easily connect their internal directories to AsureSpace(TM) Resource Scheduler

Add to Reading List

Source URL: www.onelogin.com

Language: English - Date: 2014-03-10 18:39:41
107ESET NOD32 / Computing / Data security / ESET / Security information and event management / Network Access Protection / Security event manager / Computer network security / Computer security / Software / Antivirus software

Endpoint--Features--Business Perspective.indd

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2012-03-30 08:47:27
108National security / Computer security / Data security / Information security / Project management / Freedom of information legislation / Security guard / Security / Crime prevention / Public safety

8. Security Education and Awareness Iowa Access Request final.doc Page 1 IOWAccess Project Concept Paper 1. Email completed copy to the IOWAccess Manager: [removed] .

Add to Reading List

Source URL: iowaccess.iowa.gov

Language: English - Date: 2009-09-03 15:35:21
109Software / Microsoft Access / Dispatch / Windows Vista / Data management / Relational database management systems / Logistics

INTELLIGENCE OPERATIONS SIT/209 PROGRAM MANAGER’S TOOLS Manager’s Guide January 2014

Add to Reading List

Source URL: www.predictiveservices.nifc.gov

Language: English - Date: 2014-01-13 09:16:00
110Access control / Health Insurance Portability and Accountability Act / Identity management systems / Data security / Password manager / Password strength / Security / Computer security / Password

Local Health Operations Table of Contents

Add to Reading List

Source URL: chfs.ky.gov

Language: English - Date: 2014-08-09 14:44:48
UPDATE