Information security management system

Results: 3115



#Item
501Ethics / Actuarial science / Security / Data security / ISO 31000 / Information security management system / Enterprise risk management / IT risk management / Risk / Management / Risk management

Risk Management Framework THIS PAGE INTENTIONALLY LEFT BLANK Foreword

Add to Reading List

Source URL: dcsi.sa.gov.au

Language: English - Date: 2013-06-27 03:31:38
502Computing / Department of Defense Information Assurance Certification and Accreditation Process / Federal Information Security Management Act / Backup / Host Based Security System / Security / Computer security / Data security

Security Manager Cybernet Security Manager A Proven Solution to Cybersecurity Challenges at Competitive Prices Cybernet’s Security Manager delivers solutions to your Cybersecurity and Information Assurance (IA) managem

Add to Reading List

Source URL: cybersecurity.cybernet.com

Language: English - Date: 2015-03-31 10:56:30
503Management / Law / Outsourcing / Service-level agreement / Subcontractor / Business process outsourcing / Information security management system / Contract law / Information technology management / Business

STM[removed]Security and Trust in IT Business Outsourcing: a Manifesto 6 Y. Karabulut 1 F. Kerschbaum 2 P. Robinson 4 SAP Research

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:28:02
504World Trade Organization / World government / Information security management system / Least developed country / International trade / International economics / International relations

Building institutional capacity in the use of trade-related international support measures (ISMs) for LDCs Geneva[removed]November[removed]Cost Benefit Analysis Survey questionnaires*

Add to Reading List

Source URL: esango.un.org

Language: English - Date: 2014-12-03 15:50:34
505Computing / Data security / System administration / Network management / Security information and event management / Accelops / Denali Alaskan Federal Credit Union / Security event manager / Information security / Computer security / Security / Information technology management

CASE STUDY Customer: Denali Alaskan Federal Credit Union Industry: Financial Services Results with AccelOps:

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-17 12:56:20
506Computing / Host Based Security System / McAfee / Companies listed on the New York Stock Exchange / Computer security

Solutions Brief Optimizing Security Management with McAfee ePolicy Orchestrator The proof is in the research Chief information officers (CIOs) at enterprises worldwide are facing a major struggle

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:58
507Data security / Information security management system / Geneva

Developing an SPS/TBT Electronic Notification System (ENS) Workshop on Building Institutional Capacity in the Use of Trade-Related International Support Measures (ISMs) November 17-24, 2014 Geneva

Add to Reading List

Source URL: esango.un.org

Language: English - Date: 2014-12-03 15:18:06
508Security information and event management / Computing / Security / McAfee VirusScan / Host Based Security System / McAfee / Computer security / Companies listed on the New York Stock Exchange

Data Sheet McAfee Enterprise Security Manager Discover. Respond. Comply.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-09-30 13:14:00
509Data management / Backup software / Fault-tolerant computer systems / Backup / Data security / Load balancing / Server / Hot spare / Disk-to-disk / Computing / System software / Information technology management

BusinessContinuityServices.pub

Add to Reading List

Source URL: www.echomountain.com

Language: English - Date: 2012-02-21 22:26:37
510Cyberwarfare / Information operations / Radio spectrum / Electronic warfare / Spectrum management / Global Positioning System / Wireless / Technology / Military science / Wireless networking

ASYMMETRIC THREAT GLOBAL SNAPSHOT MAY 2014 Maneuvering Room - Electromagnetic Spectrum Dominance and National Security The most important resource in U.S. national security may also be its most vulnerable – and taken

Add to Reading List

Source URL: asymmetricthreat.net

Language: English - Date: 2014-08-29 13:49:32
UPDATE