Information security management system

Results: 3115



#Item
81Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
82Standards organizations / Data security / Information security management system / ISO/IEC JTC 1 / Public key certificate / Professional certification / ISO/IEC 27001:2005

Certificate of Registration THIS IS TO CERTIFY THAT THE INFORMATION SECURITY MANAGEMENT SYSTEM OF LEO TECH Services Pte Ltd 8 Eu Tong Sen Street

Add to Reading List

Source URL: www.leotech.com.sg

Language: English - Date: 2016-05-16 01:54:07
83United States Department of Homeland Security / Office of Biometric Identity Management / Automated Targeting System / Hugo Teufel III / Privacy Impact Assessment / Biometrics / Privacy Office of the U.S. Department of Homeland Security / DHS National Protection and Programs Directorate / Homeland Security Act / Electronic Privacy Information Center / Privacy / Secure Flight

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to the NATIONAL PROTECTION AND PROGRAMS DIRECTORATE of the THE DEPARTMENT OF HOMELAND SECURITY [DHS Docket No. DHSAgency Information Collection Activities

Add to Reading List

Source URL: epic.org

Language: English - Date: 2013-06-14 19:17:41
84Geodesy / Geographic coordinate systems / Geography of the United States / United States National Grid / Geographic data and information / OMB Circular A-16 / Interoperability / Military grid reference system / Federal Emergency Management Agency / Emergency management / United States Department of Homeland Security / Federal Geographic Data Committee

Thank you for the opportunity to comment.    This comment addresses a valuable national standard for spatial   interoperability known as the U.S. National Grid.  The U.S. National Grid   (U

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-12-03 17:48:10
85Auditing / Actuarial science / Information governance / Management / Security / Enterprise risk management / Corporate governance / Audit / Information security / Internal control / Management system / Risk management

63 PIDM Annual Report 2015 Section

Add to Reading List

Source URL: www.pidm.gov.my

Language: English - Date: 2016-04-25 15:55:36
86Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Information security / BSI Group / DocuSign / Professional certification / Computer security

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: DocuSign, IncSecond Ave, Suite 2000

Add to Reading List

Source URL: www.docusign.com

Language: English - Date: 2015-05-29 02:09:07
87Data security / Prevention / Security / Identity documents / Privacy / Computing / Personal life / Personally identifiable information / Identity management / Privacy Office of the U.S. Department of Homeland Security / Internet privacy / Information security

U.S. Department of Commerce NOAA Privacy Impact Assessment For the NOAA4930 System

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-02-04 14:23:41
88Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / Information security management system

Paris, February 11, 2016 Press release: Beijaflore has got the ISOcertification for the whole company By obtaining the ISO/IEC 27001:2013 certification for the whole Group, Beijaflore becomes the first and only

Add to Reading List

Source URL: www.beijaflore.com

Language: English - Date: 2016-02-18 12:28:33
89Ethernet / NetFlow / Computing / Network switch / System software / Information technology management / Local area networks / Network management / Computer network security

Distributed Computing Prof. R. Wattenhofer Classifying Usage of LAN Ports In recent years, technologies such as

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-12-23 06:49:21
90System administration / Information technology / Computing / Data security / Downtime / Failure / Information technology management / Maintenance / High availability / Backup / Availability / Veeam Software

veeamup_ulli_infograph_15_fr

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
UPDATE