Information security management system

Results: 3115



#Item
381Identity management / Public safety / Password / Access control / Information security / System administrator / Human resource management system / Security / Computer security / Computing

Microsoft Word - Abra HRMS Security white paper.doc

Add to Reading List

Source URL: www.dresserassociates.com

Language: English - Date: 2011-10-24 09:30:52
382Information technology management / Information security / National security / Information Technology Infrastructure Library / Employment / Public safety / Prevention / Computer security / Security / Data security

ANNEXURE A DEPARTMENT OF COOPERATIVE GOVERNANCE The vision of the Department of Cooperative Governance is one of having a well-co-ordinated system of Government consisting of National, Provincial and Local spheres workin

Add to Reading List

Source URL: www.dpsa.gov.za

Language: English - Date: 2015-03-09 03:48:04
383Data security / Installation / System administration / Microsoft Windows / Windows Server / Information technology specialist / Windows / System software / Software / Backup

Professional Services Installation Services Open Storage Solutions® Inc offers Professional Services for data management solution deployment to meet your business objectives. Integrating hardware, software, services, su

Add to Reading List

Source URL: www.openstore.com

Language: English - Date: 2011-07-05 11:24:23
384Domain name system / Internet protocols / Key management / Internet standards / DNSSEC / Domain Name System Security Extensions / Unbound / Windows / Name server / Internet / System software / Computing

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, October 2010 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: unbound.net

Language: English - Date: 2010-11-08 06:57:17
385Business / Public records / Project management / Data management / Security / Records management / Information security / Freedom of information legislation / Document management system / Information technology management / Content management systems / Administration

Good Practice in Records Management and Information Security BELB LJ Schools 2013 How Valuable are Records & Documents?

Add to Reading List

Source URL: www.belb.org.uk

Language: English - Date: 2013-05-14 06:44:57
386Computing / Electronic engineering / Data management / Data processing system / Simula / Database / Computer security / Information security / Parallel computing / Security / Crime prevention / National security

DecemberCLASSIFICATION DEFINITIONS CLASS 713, ELECTRICAL COMPUTERS AND DIGITAL PROCESSING SYSTEMS: SUPPORT

Add to Reading List

Source URL: www.uspto.gov

Language: English - Date: 2012-02-08 09:48:46
387Performance measurement / Strategy map / Dashboard / Asset allocation / Strategic management / Information security management system / Third-generation balanced scorecard / Performance-based budgeting / Management / Business / Balanced scorecard

CEED Seminar ProceedingsArthur: Asset Planning Performance Measurement Framework Asset Planning Performance Measurement Framework Daniel Arthur

Add to Reading List

Source URL: www.ceed.uwa.edu.au

Language: English - Date: 2015-03-17 22:48:02
388Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
389Privacy / Crime / Internet privacy / Ohio Automated Rx Reporting System / Ethics / Identity management / Law

Information Privacy & Data Security Practice Group Law Alert A Corporate Department Publication Ohio’s Requirement to Report Data Breach to Law Enforcement

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2013-12-19 14:45:03
390Security / Good Laboratory Practice / United States Environmental Protection Agency / Information security / Toxic Substances Control Act / Information systems / Laboratory information management system / Information technology

EdGOOD AUTOMATED LABORATORY PRACTICES Chapter 1 — GALP Overview

Add to Reading List

Source URL: www.atlab.com

Language: English - Date: 2015-03-30 01:52:29
UPDATE