Information security management system

Results: 3115



#Item
491National security / Cyberwarfare / Data security / Information security / Federal Information Security Management Act / Vulnerability / Security / Computer security / Crime prevention

Department of Information Technology and Selected State Agencies - Information System Data Security[removed]

Add to Reading List

Source URL: www.ola.state.md.us

Language: English - Date: 2012-10-04 11:41:48
492Information technology management / Document management system

eDoc Security Document Management System flexible solutions for security documents

Add to Reading List

Source URL: www.mmtvbd.com

Language: English - Date: 2014-07-30 15:23:58
493Records management / Information security management system / Business / Accountability / Data security / Administration / Information technology management

PART A BACKGROUND Section 28 of the State Records Act[removed]the Act) requires that

Add to Reading List

Source URL: www.sro.wa.gov.au

Language: English - Date: 2015-04-07 21:47:48
494Cyberwarfare / Local area networks / Computer security / DMZ / OSSIM / Intrusion detection system / Firewall / Virtual LAN / Security information and event management / Computer network security / Data security / Computing

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-04 04:12:49
495Accountability / Governance / Political geography / Political philosophy / Information technology management / Corporate governance of information technology / Information security management system / Data security / Security / Business

Implementing Effective Enterprise Security Governance Outline for Energy Sector Executives and Boards Introduction As recent attacks, Presidential Executive Order for Improving Critical Infrastructure

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2014-03-25 14:58:43
496Computer security / Network management / System administration / Healthways / Security information and event management / Accelops / Cloud computing / Data center / Oracle Database / Computing / Information technology management / Software

CASE STUDY Healthways Monitors and Secures Global Health and Wellness with AccelOps B

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-01 17:10:58
497

Information Security Management System 情報セキュリティマネジメントシステム

Add to Reading List

Source URL: www.isms.jipdec.or.jp

Language: Japanese - Date: 2014-07-17 19:58:36
    498Database management systems / Database theory / Crime prevention / Criminal investigation / Geographic information system / Criminal intelligence / Data mining / Data integration / Database design / National security / Law enforcement / Law

    COPLINK Arming Law Enforcement with New Knowledge Management Technologies Roslin V. Hauck, Michael Chau & Hsinchun Chen University of Arizona, Tucson, Arizona USA

    Add to Reading List

    Source URL: www.business.hku.hk

    Language: English - Date: 2003-09-01 19:59:28
    499Computing / Security information and event management / Host Based Security System / McAfee / Software / McAfee VirusScan

    Case Study DearBytes Builds World-Class Managed Security Services With McAfee Enterprise Security Manager

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2015-04-10 10:46:03
    500Risk / Software testing / Rapid7 / Carnegie Mellon University / Social vulnerability / Vulnerability / Information security / Carnegie Mellon Silicon Valley / Software / Computer security / System software

    Vulnerability Management Case Study Rapid7 Nexpose Meets Carnegie Mellon University’s Requirements for Vulnerability Management, Co-Development and Higher Education Expertise Broadening Protection to Ensure Campus-Wid

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:53:55
    UPDATE