Information security management system

Results: 3115



#Item
21Computing / Wireless networking / Security / Computer network security / Information technology management / Secure communication / Data security / Wireless sensor network / Steganography / Computer security / Artificial immune system / Quality of service

CURRICULUM VITAE Prof. Sugata Sanyal School of Technology & Computer Science Tata Institute of Fundamental Research Homi Bhabha Road, Mumbai – 400005, India. Email:

Add to Reading List

Source URL: www.tifr.res.in

Language: English - Date: 2011-12-14 05:57:20
22Information technology management / Information technology / Computing / Human resource management / Human resource management system / HRMS / Enterprise content management / Computer security

THE PST Project News ISSUE 1 December 22, 2010

Add to Reading List

Source URL: www.synergycentric.com.my

Language: English - Date: 2013-01-10 00:21:00
23Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
24Data security / Computing / Prevention / Computer security / Security / Information technology management / Information security management system / ISO/IEC 27001:2013 / Management system / Information security / ISO/IEC 27001:2005 / ISO/IEC 27000-series

Information Security Management Systems Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer © atsec information security, 2013

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:09:37
25IT risk management / Security / Information technology management / Computing / Disaster recovery / Data management / Backup / Cryptography / Emergency management / Computer security / Emergency communication system / Business continuity planning

SearchSMBStorage business continuity plan template

Add to Reading List

Source URL: www.clic.net

Language: English - Date: 2016-01-26 15:10:57
26Data security / Prevention / Security / Identity documents / Privacy / Computing / Personal life / Personally identifiable information / Identity management / Privacy Office of the U.S. Department of Homeland Security / Internet privacy / Information security

U.S. Department of Commerce NOAA Privacy Impact Assessment For the NOAA4930 System

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2016-02-04 14:23:41
27Information technology / Information technology management / Engineering / Method engineering / Management / Security / Systems engineering / Joint Capabilities Integration Development System / Analysis of Alternatives / Department of Defense Architecture Framework / Risk management / ITIL

Interoperability ClearingHouse Architecture Assurance Method (AAM) A consensus base process standard for enabling sound IT investment decisions Streamlined DoDand Clinger Cohen Act Compliance

Add to Reading List

Source URL: www.ichnet.org

Language: English - Date: 2011-09-13 11:23:10
28Information technology management / Corporate Governance of ICT / Evaluation / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

Organizational Unit National ICT Governance (NIG) - Program Monitoring, Evaluation and Statistical Coordination Division (PMESC) Functions of the Division Position

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:56
29Computing / Security / Linear Tape-Open / Information science / Data management / Backup / Data security / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:42
30Information technology / Government / Information / Information technology management / Strategic management / Fusion center / Surveillance / United States Department of Homeland Security / Business process management / Fusion / Information system / Enterprise architecture

DEPAR DHS/DOJ Fusion Process Technical Assistance Program and Services

Add to Reading List

Source URL: www.ncirc.gov

Language: English - Date: 2010-07-15 14:15:48
UPDATE