Information security management system

Results: 3115



#Item
41CASE STUDY  Greenhouse Software Greenhouse Software Recruits Top Candidates with Powerful Log Data Performance  Organization

CASE STUDY Greenhouse Software Greenhouse Software Recruits Top Candidates with Powerful Log Data Performance Organization

Add to Reading List

Source URL: www.sumologic.com

Language: English - Date: 2016-06-13 14:50:22
42SOLUTION SHEET  Big Data Analytics Making all Machine Data Accessible, Usable, Valuable  WHY GTRI

SOLUTION SHEET Big Data Analytics Making all Machine Data Accessible, Usable, Valuable WHY GTRI

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2016-03-15 18:34:14
43Job Opening April 19, 2016 JOB TITLE: DEPT:  System Security Administrator

Job Opening April 19, 2016 JOB TITLE: DEPT: System Security Administrator

Add to Reading List

Source URL: esd.ny.gov

Language: English - Date: 2016-04-19 12:12:44
44Anomaly detection from server log data.  A case study

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
45Procurement Service Line Service Descriptions Overview/Summary of Services//ARC ARC Procurement provides a full range of procurement services including procurement system platform, simplified acquisition, contract, contr

Procurement Service Line Service Descriptions Overview/Summary of Services//ARC ARC Procurement provides a full range of procurement services including procurement system platform, simplified acquisition, contract, contr

Add to Reading List

Source URL: arc.publicdebt.treas.gov

Language: English - Date: 2016-05-06 08:37:00
46A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald  Robert McGuire

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
47PROFESSIONAL SERVICES  Enterprise Security Services — Medium Professional Services Offering  to provide immediate awareness of the anomalies in

PROFESSIONAL SERVICES Enterprise Security Services — Medium Professional Services Offering to provide immediate awareness of the anomalies in

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 10:27:44
48Information Technology Procedures CCC Data Coordinator Annual Reporting Procedures Revision Date:

Information Technology Procedures CCC Data Coordinator Annual Reporting Procedures Revision Date:

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2015-09-02 12:53:04
49Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ATM S.A. Data Center ATMAN

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ATM S.A. Data Center ATMAN

Add to Reading List

Source URL: ru.atman.pl

Language: English - Date: 2015-09-18 06:10:27
50CASE STUDY  Crossroads Foundation Gains Operational Visibility Into Mission-Critical Systems Industry •	 Nonprofit

CASE STUDY Crossroads Foundation Gains Operational Visibility Into Mission-Critical Systems Industry • Nonprofit

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-20 06:36:02