Enterprise information security architecture

Results: 258



#Item
11Data management / Data / Technical communication / Knowledge representation / Information architecture / Service-oriented architecture / Checklist / Findability / Data architecture / Information / Enterprise architecture / Information science

JOURNAL OF INFORMATION ARCHITECTURE | VOLUME 2 ISSUE 2 PEER-REVIEWED PAPER Laura Downey Transportation Security Administration (TSA)

Add to Reading List

Source URL: journalofia.org

Language: English - Date: 2011-01-31 09:25:38
12WS-ReliableMessaging / Enterprise application integration / WS-Reliability / WS-Notification / WS-Eventing / Globus Toolkit / Middleware / Service-oriented architecture / WS-Security / Computing / Web services / World Wide Web

For more information, visit: ptl.iu.edu NaradaBrokering NaradaBrokering is an open source technology supporting a suite of capabilities for reliable, robust, and flexible messaging. This middleware

Add to Reading List

Source URL: grids.ucs.indiana.edu

Language: English - Date: 2009-10-26 20:48:54
13Systems engineering / Software engineering / Solution architecture / Computing / Information technology management / Computer security / Software architecture / Enterprise architecture / Systems architect

Are you passionate about Architecture and delivering results? Do you want to help us deliver our corporate plan and help us shape our future? Do you want to work somewhere that values you and will support you to grow?

Add to Reading List

Source URL: www.ukho.gov.uk

Language: English - Date: 2015-05-08 08:37:04
14Government Enterprise Architecture / Enterprise architect / The Open Group Architecture Framework / Enterprise information security architecture / Enterprise architecture / Information technology management / Enterprise architecture framework

White Paper on IT Architecture

Add to Reading List

Source URL: www.digst.dk

Language: English - Date: 2012-05-29 09:32:59
15Private law / Lease / Information security management system / Affordable housing / Housing association / Property management / Public housing / Stakeholder / Enterprise Architecture Assessment Framework / Real estate / Property / Law

Guidance – October 2007 Completing the registration application form

Add to Reading List

Source URL: www.housingregistrar.vic.gov.au

Language: English
16Information Technology Infrastructure Library / Management / Enterprise Architecture Assessment Framework / Environment Agency / Information technology management / Data security / Information security management system

RHA004_Guidance_Reg App form 03.indd

Add to Reading List

Source URL: www.housingregistrar.vic.gov.au

Language: English
17Data security / Corporate governance of information technology / Information Technology Infrastructure Library / Business architecture / EGovernment in Europe / Enterprise information security architecture / Information technology management / Enterprise architecture / Computing

Position: Information Technology Manager Level:

Add to Reading List

Source URL: www.shra.org.za

Language: English - Date: 2015-01-22 07:20:06
18Common Criteria / Enterprise application integration / Web services / National security / Computing / Service-oriented architecture / Security-evaluated operating system / Evaluation / Security / Computer security

TRA Process for Information Technologies of Information Systems

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:46
19Ethology / Computer security / Enterprise architecture / Science / Strategic information system / Theories of technology / Economic model / Information systems / Technology

...- ..- .... -. .- C U L T U R A L -- - --

Add to Reading List

Source URL: www.archimuse.com

Language: English - Date: 2011-09-09 18:19:37
20Enterprise architecture / Data security / Information security / National security / Enterprise architect / Email / Public safety / Computing / Computer security / Security

JOB DESCRIPTION 1 Enterprise Architect – Security 1.1 Job Purpose: Responsible for the design of NATGRID’s Enterprise Security Architecture, and to ensure security & integrity of information, applications, systems an

Add to Reading List

Source URL: nisg.org

Language: English - Date: 2015-02-11 05:00:22
UPDATE