Information Technology Security Assessment

Results: 459



#Item
71Science / Business / Project management / Software development process / Risk management / Enterprise risk management / IT risk management / Actuarial science / Security / Information technology management

Department of the Environment, Water, Heritage and the Arts: Risk Assessment of the Insulation Components under the Energy Efficient Homes Package 1. Project methodology and business model - post 1 July:

Add to Reading List

Source URL: laptop.deh.gov.au

Language: English - Date: 2010-02-19 02:52:56
72Ethics / Crime prevention / Privacy law / Lawful interception / Surveillance / Mass surveillance / Privacy / Communications Assistance for Law Enforcement Act / Regulation of Interception of Communications and Provision of Communication-related Information Act / Security / National security / Privacy of telecommunications

SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-15 15:13:07
73Crime prevention / National security / Electronic commerce / Computer network security / Emergency management / Risk / Computer security / Information technology audit process / Security / Public safety / Ethics

• free network assessment overview Today’s computer environments are increasingly complex. From software

Add to Reading List

Source URL: www.lvsimplyit.com

Language: English - Date: 2014-12-29 10:39:04
74Audit / Security / IT risk / Technology assessment / Information technology audit process / Privacy Act / Auditing / Risk / Computer security

DOC Document

Add to Reading List

Source URL: www.privacy.org.nz

Language: English - Date: 2014-09-24 22:15:05
75X Window System / Computer network security / Electronic test equipment / Software / Computer / Computing

Hong Kong Examinations and Assessment Authority Hong Kong Certificate of Education Examination 2008 Computer and Information Technology Paper 3 (Coursework) Module A (Algorithm and Programming): Composition Analyzer A co

Add to Reading List

Source URL: www.ilc.edu.hk

Language: English - Date: 2007-10-09 03:10:54
76Electronic commerce / Computer law / Payment Card Industry Data Security Standard / Business / Information technology management / Economics / Payment systems / Data privacy / Credit cards

MegaPath Managed PCI 3.0 Solutions Assessment, Protection and Compliance Assistance With new PCI 3.0 requirements, continuous compliance and continuous monitoring are essential to reducing the risk of a data breach. How

Add to Reading List

Source URL: www.megapath.com

Language: English - Date: 2015-03-31 19:49:14
77Security / Software testing / Data security / Hacking / Vulnerability / Social vulnerability / Firewall / Cracking of wireless networks / Information Technology Security Assessment / Computer network security / Computer security / Cyberwarfare

PatchAdvisor_LOGO-revised-FINAL

Add to Reading List

Source URL: www.patchadvisor.com

Language: English - Date: 2014-12-12 12:21:10
78Project management / Digital continuity / Electronic document and records management system / Data migration / Project governance / Information Services Procurement Library / Risk assessment / Information security management system / Records management / Information technology management / Business / Management

Migrating Information between EDRMS This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Language: English - Date: 2013-10-25 10:18:57
79Safety / Actuarial science / Information technology audit / Audit / Risk assessment / Risk management / Safety Management Systems / Information technology audit process / Clinical audit / Risk / Auditing / Security

Surveillance Process Developments - Vector magazine, March/April 2012

Add to Reading List

Source URL: www.caa.govt.nz

Language: English - Date: 2012-05-01 18:44:45
80Applied ethics / Environmental impact assessment / Impact assessment / Sustainable development / Technology assessment / Environmental Protection Authority of Western Australia / Confidentiality / Information security / Environment / Environmental law / Ethics

Waste Management and Pollution Control Act[removed]APPLICATION TO HAVE COMMERCIALLY CONFIDENTIAL INFORMATION WITHHELD FROM THE PUBLIC REGISTER Pursuant to Section[removed]This form is the approved form in accordance with Se

Add to Reading List

Source URL: www.ntepa.nt.gov.au

Language: English - Date: 2013-03-14 00:53:30
UPDATE