<--- Back to Details
First PageDocument Content
Strategic management / Federal enterprise architecture / Government / Clinger–Cohen Act / United States Department of Homeland Security / OMB Circular A-130 / Corporate governance of information technology / Business / Bureau of Information Resource Management / United States Office of Management and Budget / Management / Chief information officer
Date: 2014-03-13 15:52:12
Strategic management
Federal enterprise architecture
Government
Clinger–Cohen Act
United States Department of Homeland Security
OMB Circular A-130
Corporate governance of information technology
Business
Bureau of Information Resource Management
United States Office of Management and Budget
Management
Chief information officer

IRM Strategic Plan[removed]

Add to Reading List

Source URL: www2.ed.gov

Download Document from Source Website

File Size: 1,14 MB

Share Document on Facebook

Similar Documents

Education / Human behavior / Cognition / Organizational theory / Educational psychology / Master's degree / Academic degree / Management / Critical thinking / Scientific method / Bachelor's degree / Research

Learning Outcomes for Master of Business Management (MBM) National Qualification Framework for Iceland Master of Management at Reykjavik University Master of Business Management (MBM) is a 90 ECTS-credit qualification at

DocID: 1xW2d - View Document

Prevention / Security / Computer security / Computing / Data security / ISO/IEC 27001 / Safety / Information security / Management system / ISMS / ISO/IEC 27006 / Information security management

1.3 ISMS POLICY It is the policy of Porism to maintain an information management system designed to meet the requirements of ISO 27001:2013 in pursuit of its primary

DocID: 1xW14 - View Document

Financial services / Economy / Finance / Banking / Payment systems / Cheque / Numismatics / Single Euro Payments Area / Euro / Bank / ING Group

Deutsche Bank Global Transaction Banking Cash Management Pricing schedule for

DocID: 1xVZA - View Document

Firewall software / Computing / Computer security / Cyberwarfare / Computer network security / Cybercrime / Application firewall / Web application firewall / Fastly / Firewall / Waf / Cyberattack

Fastly WAF Management Package QUICK VALUE PACK AGES Unleash the value of Fastly without tying up scarce IT resources

DocID: 1xVYh - View Document