Enterprise information security architecture

Results: 258



#Item
111Geographic information system / Application software / Help desk / Database / Computer security / National Informatics Centre / Enterprise information security architecture / Technology / Business / Computing

Microsoft Word - IT--INFORMATION TECHNOLOGY

Add to Reading List

Source URL: maps.co.randolph.nc.us

Language: English - Date: 2013-07-11 16:36:42
112Data security / Computer security / Science / Enterprise architect / Corporate governance of information technology / Chief information officer / Planning / Information security / IT portfolio management / Management / Security / Enterprise architecture

Goal: Excellent Customer Service

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 21:13:50
113Enterprise architecture / Public administration / Open government / Content management systems / Information governance / Information security / Enterprise information management / Freedom of information legislation / E-Government / Information technology management / Technology / Business

Brief to the Task Force on Right to Information and Protection of Personal Information from Diane Nadeau, ISP

Add to Reading List

Source URL: www.gnb.ca

Language: English - Date: 2007-07-24 07:44:42
114Technology / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Interoperability / Technology roadmap / Information technology management / NIST Enterprise Architecture Model / NIST Special Publication 800-53 / Standards organizations / Computing / Computer security

Microsoft Word - BD_Vol7-TechRoadmap_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:19:53
115Privacy Office of the U.S. Department of Homeland Security / Internet privacy / DBT / Information / Science / Structure / Business Transformation Agency / TMA / Enterprise architecture

Microsoft PowerPoint - TMAPrivacyDefenseBusinessTransformation

Add to Reading List

Source URL: www.tricare.mil

Language: English - Date: 2013-03-18 16:27:33
116Enterprise architecture / Computer security / Data security / Enterprise architect / Strategic management / Infrastructure optimization / Information security / Business model / Technology strategy / Management / Business / Information technology management

TechTrends Developing and Implementing a Strategy for Technology Deployment Successfully deploying information technology requires executive-level support, a structured

Add to Reading List

Source URL: www.arma.org

Language: English - Date: 2008-04-09 18:53:33
117Cloud computing / Computing / Computer security / Software architecture / Information technology management / Emerging technologies / NIST Enterprise Architecture Model / Open-system environment reference model / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - BD_Vol6-RefArchitecture_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:19:43
118United States Office of Management and Budget / United States Environmental Protection Agency / Law / Information security / Priority right / Government / Security / Clinger–Cohen Act / Enterprise architecture

http://[removed]oswerTraining/reporttrainingReqsAudience.cfm

Add to Reading List

Source URL: www.trainex.org

Language: English - Date: 2009-03-03 10:59:25
119Patch / Information technology management / Business / Software / Software as a service / V.i. Labs / Business software / Enterprise architecture / Enterprise software

Avoiding Security Risks with Regular Patching and Support Services

Add to Reading List

Source URL: www.oracle.com

Language: English
120Computer security / Cloud computing / Computing / Information technology management / Security / Risk analysis / NIST Enterprise Architecture Model / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Word - BD_Vol1-Definitions_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:15:47
UPDATE