Information security management system

Results: 3115



#Item
91Computing / Information technology / Data management / Radio-frequency identification / Database / Data architecture / Computer security / Internet of things / Interoperability / Embedded system / Wireless sensor network / Data warehouse

Challenges of Secure and Reliable Data Management in Heterogeneous Environments Norbert Siegmund, Janet Feigenspan, Michael Soffner, Jana Fruth, Veit Köppen Otto-von-Guericke University Magdeburg, Germany {nsiegmun, fe

Add to Reading List

Source URL: wwwiti.cs.uni-magdeburg.de

Language: English - Date: 2011-03-23 13:27:55
92Data security / Crime prevention / Cryptography / Information governance / National security / Information security / BSI Group / Professional certification / DocuSign / International Organization for Standardization / Computer security / ISO/IEC 20000

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: DocuSign, IncSecond Ave, Suite 2000

Add to Reading List

Source URL: www.docusign.de

Language: English - Date: 2015-05-29 02:09:07
93Security / Computer security / Prevention / Cyberwarfare / Crime prevention / Cryptography / National security / Federal Information Security Management Act

Earth System Grid Federation (ESGF) Software Security Plan

Add to Reading List

Source URL: esgf.llnl.gov

Language: English - Date: 2016-06-01 13:26:15
94Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / Key management / DNSSEC / Domain Name System Security Extensions / Domain name registry / Domain name / Information security

KSRegistry DNSSEC Policy Statement 1. INTRODUCTION............................................................................................................................5 1.1 Overview..............................

Add to Reading List

Source URL: nic.gd

Language: English - Date: 2016-06-06 05:48:12
95Scientific method / Computing / Security / Prevention / Data management / Knowledge / Research / Data sharing / Geographic information system / Password / Computer security / Data management plan

GAY MEN’S SEXUAL HEALTH SURVEY (GMSHS): GUIDANCE ON USE OF DATA BY EXTERNAL RESEARCHERS: COMPLETING THE APPLICATION FORM Section 1: The proposal

Add to Reading List

Source URL: gaymensurvey.sphsu.mrc.ac.uk

Language: English - Date: 2016-06-17 10:37:58
96Data security / Crime prevention / Cryptography / Information governance / National security / Information security / BSI Group / Professional certification / DocuSign / Computer security / ISO/IEC 20000 / ISO/IEC 27001:2005

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: DocuSign, IncSecond Ave, Suite 2000

Add to Reading List

Source URL: www.docusign.jp

Language: English - Date: 2015-05-29 02:09:07
97Data security / Computer security / Security / Computer network security / Cryptography / Information security management system / IT risk management / Information security / ISO/IEC 27001:2013 / Vulnerability / Security controls / Risk management

POLICY think project! INFORMATION SECURITY MANAGEMENT SYSTEM INFORMATION SECURITY POLICY

Add to Reading List

Source URL: www.thinkproject.com

Language: English - Date: 2015-03-17 10:50:21
98Password / Security / Cryptography / Cybercrime / Onboarding / Outlook.com / Point and click / Computer security

FermiWorks Initial Sign In and OnboardingWelcome to Fermilab! One important part of onboarding is to enter your account information into FermiWorks, Fermilab’s Human Capital Management System. FermiWorks is

Add to Reading List

Source URL: fermiworks.fnal.gov

Language: English - Date: 2016-03-28 17:04:06
99Software / Cryptographic software / Computing / Secure Shell / System software / Key management / Comparison of SSH servers / Ssh-agent / Ssh-keygen

ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Souppaya, Karen Scarfone, 1 and Larry Feldman, 2 Editors Computer Security Division Information Technol

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-01-11 10:13:44
100Security / Computing / Information technology management / Information system / Computer security / Application software / Web development / Information technology consulting / ICDC College / Professional certification

WHAT CAN I DO WITH THIS DEGREE? COMPUTING & INFORMATION SYSTEMS (CIS) INTRODUCTION The College of Information Technology at University of Dubai offers a Bachelor Degree in Computing and Information Systems (CIS) that is

Add to Reading List

Source URL: www.ud.ac.ae

Language: English - Date: 2013-12-26 01:11:20
UPDATE