Information security governance

Results: 1058



#Item
171Cyberwarfare / Cybercrime / Information and communication technologies for development / National security / International Telecommunication Union / Cyberspace / Internet Governance Forum / Computer security / Commonwealth of Nations / International Multilateral Partnership Against Cyber Threats / Commonwealth Telecommunications Organisation

The role of the Commonwealth in facilitating cooperation in Cyberspace Shola Taylor, Secretary-General, Commonwealth Telecommunications Organisation Commonwealth Cybersecurity Forum 2016, 23 March 2015 Honourable Adriel

Add to Reading List

Source URL: www.cto.int

Language: English - Date: 2016-06-23 04:56:26
172Computer network security / Crime prevention / Cryptography / Information governance / National security / Check Point / Computer security / BigFix Inc

Check Point Smart Management Suite | Datasheet

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-03-16 15:49:01
173Computer network security / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Internet privacy / Computer security / Information privacy / Privacy / Privacy concerns with social networking services / Cloud computing security

Acceptable Use Policy for Wadham IT General Rules 1. All individuals wishing to make use of Wadham College IT facilities must abide by this document. Wadham IT facilities include networking, shared IT facilities such as

Add to Reading List

Source URL: www.wadham.ox.ac.uk

Language: English - Date: 2013-08-21 07:05:29
174Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / SharePoint / Computer security

IT ACCEPTABLE USE POLICY PURPOSE The purpose of the Acceptable Use Policy for Brock University’s Information Technology (IT) systems is to protect the University, our students and employees from potential harm resultin

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:53
175Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
176Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
177Crime prevention / Cryptography / Information governance / National security / Mobile phones / Mobile security / Computer security / Mobile device / Smartphone / Internet privacy / Mobile malware / Information security

An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg) Carlo Harpes

Add to Reading List

Source URL: iaria.org

Language: English - Date: 2013-12-10 21:37:25
178Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Cisco Systems / Security / Computer network / Internet / Windows / Competition

DOC Document

Add to Reading List

Source URL: nccdc.org

Language: English - Date: 2010-01-07 14:50:06
179Data security / Crime prevention / Cryptography / Information governance / National security / Personally identifiable information / Computer security / Medical privacy / Windows Registry / Putative father registry

Identification/Verification Form May 2015 Use this form to provide The Nevada Registry with information that will help to protect the confidentiality of the information contained within your Career Development file. Info

Add to Reading List

Source URL: www.nevadaregistry.org

Language: English - Date: 2015-05-19 21:50:03
180Crime prevention / National security / Cryptography / Information governance / Data management / Information security / Computer security / Privacy / Data custodian / Data steward / Data sharing / Data Protection Act

UC Davis Policy and Procedure Manual Chapter 320, Records and Archives Section 40, Data Administration Policy Date: Supersedes: Responsible Department: Informational and Educational Technology

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2016-05-17 15:36:00
UPDATE