Information security management system

Results: 3115



#Item
981Security / OWASP / Software testing / Data security / Vulnerability / Threat / Information security management system / Penetration test / Application security / Computer security / Cyberwarfare / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Development  Organizations        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:26:03
982Data security / ISO/IEC 27006 / Accreditation / ISO/IEC 27001 / Information technology management / Conformity assessment / Information security management system / ISO/IEC 27000-series / ISO/IEC 17025 / Evaluation / Quality assurance / Standards

DOC Document

Add to Reading List

Source URL: www.apec-pac.org

Language: English - Date: 2012-08-05 19:45:17
983Logistics / Public safety / Intergraph / Interoperability / Geographic information system / Access control / Emergency management / Backup / OBIX / Security / Management / Computer-aided dispatch

Emergency management Massive crowds lined the streets of Washington DC for the historical inauguration of Barack Obama Preparing for the worst

Add to Reading List

Source URL: www.geoconnexion.com

Language: English - Date: 2013-05-21 05:16:42
984Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
985Computer security / Intrusion detection systems / Snort / Network intrusion detection system / Apache HTTP Server / Burglar alarm / Host-based intrusion detection system / Transmission Control Protocol / Prelude Hybrid IDS / Software / System software / Computer network security

Security Information Management b-i branding. technology. integration. www.b-i.com

Add to Reading List

Source URL: www.b-i.com

Language: English - Date: 2014-06-17 04:23:05
986Splunk / Information technology / Business intelligence / National security / System administration / Information technology management / Data security

Premium Reporting, Powered by Splunk Overview The Premium Reporting, Powered by Splunk offers a fully scalable and flexible reporting tool that provides complete visibility of your Sentrion environment, as well as integr

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-07-12 19:22:17
987Network management / Routing / Firewall / System software / Information technology management / Armorlogic / Application firewall / Computer network security / Computing / Load balancing

SteelApp Traffic Manager on AWS Licensing Guide SteelApp Traffic Manager and SteelApp Web App Firewall on AWS Feature Guide SteelApp Traffic Manager is a fully featured Layer-7 Application Controller, but there may be o

Add to Reading List

Source URL: media-cms.riverbed.com

Language: English - Date: 2014-08-15 09:33:40
988Windows Server / File managers / EMC Corporation / VMware / Windows / My Documents / Computer file / Trash / Windows Explorer / Microsoft Windows / System software / Software

In this talk you will learn how information security awareness training can be delivered to IT staff, like developers, management and helpdesk personnel, using actual incidents to create a lasting impression. The trainin

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:54
989Technology / Cisco Systems / Deep packet inspection / Electronics / Network security / Event data / Smart grid / Security information and event management / Cisco Security Monitoring /  Analysis /  and Response System / Computer security / Videotelephony / Computing

At-A-Glance Cisco and IBM: Enhanced Security for Operators of Critical Infrastructure Cisco and IBM Cisco next-generation intrusion-prevention system IPS

Add to Reading List

Source URL: www.cisco.com

Language: English
990Information Technology Infrastructure Library / IT service management / Information security management system / IT Service Management Forum / Change management / Incident management / COBIT / Capacity management / Corporate governance of information technology / Information technology management / Information technology / Project management

USQ Qld Australia Cater-Steel & Tan Complete Citation: Cater-Steel, Aileen and Tan, Wui-Gee[removed]itSMF Australia 2005 Conference: Summary of ITIL Adoption Survey Responses. Technical Report. Toowoomba,

Add to Reading List

Source URL: eprints.usq.edu.au

Language: English - Date: 2013-07-02 18:48:48
UPDATE