Information security management

Results: 13712



#Item
101Information technology / Information technology management / Engineering / Method engineering / Management / Security / Systems engineering / Joint Capabilities Integration Development System / Analysis of Alternatives / Department of Defense Architecture Framework / Risk management / ITIL

Interoperability ClearingHouse Architecture Assurance Method (AAM) A consensus base process standard for enabling sound IT investment decisions Streamlined DoDand Clinger Cohen Act Compliance

Add to Reading List

Source URL: www.ichnet.org

Language: English - Date: 2011-09-13 11:23:10
102Internet privacy / P3P / World Wide Web / Identity management / Computing / Privacy / Privacy policy / FTC Fair Information Practice / Data security / Privacy law / Law / Medical privacy

Microsoft Word - 457_Draft.doc

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-18 18:32:58
103Security / Prevention / Computer security / Safety / Computer network security / Crime prevention / National security / Insider threat / Threat / Risk management / Information security audit / Information security awareness

Opinion Managing Insider Threats Is a Key Component to Cyber Security June 13, 2016 Most directors recognize the growing importance of cyber security,

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2016-06-13 10:31:11
104Information technology management / Corporate Governance of ICT / Evaluation / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

Organizational Unit National ICT Governance (NIG) - Program Monitoring, Evaluation and Statistical Coordination Division (PMESC) Functions of the Division Position

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:56
105Computing / Security / Cryptography / Cloud computing / Information technology management / Crime prevention / National security / Digital transaction management / XDTM Standard Association / Records management / Computer security / ARX

The xDTM Standard The Transaction Management Standard for an Open Digital World Executive Brief The xDTM Standard

Add to Reading List

Source URL: www.xdtm.org

Language: English - Date: 2016-06-28 14:48:03
106Computing / Security / Linear Tape-Open / Information science / Data management / Backup / Data security / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:42
107Computing / Internet privacy / Internet / Computer security / Privacy / Identity management / Internet security / Human rights / Tor / Information privacy / Google Public DNS / HTTP cookie

DE GRUYTER OLDENBOURG it – Information Technology 2015; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Herrmann*

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-03-23 12:56:37
108Digital rights / Human rights / Data security / Identity management / Law / Privacy / Information privacy / Internet privacy / Right to privacy / Medical privacy / Digital media / Internet activism

“Control of Personal Information: A Dialogue Between a Technologist and a Lawyer” Radcliffe Inst. and Harvard Div. of E&AS Symposium on Security and Privacy April 23, 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-05-07 13:54:31
109Information technology / Administration / Public records / Computing / Records management / Information technology management / Content management systems / Information security / Digital preservation / Retention period / Freedom of information laws by country / Information privacy

Information Management Toolkit for Schools Version 5 · 01 February 2016 SPONSORED BY

Add to Reading List

Source URL: www.irms.org.uk

Language: English - Date: 2016-02-01 11:07:24
110Auditing / Prevention / Economy / Business / Security / Actuarial science / Computer security / Data security / Risk management / Internal control / Information security / Ramboll Environ

AffinityRisk & Compliance Report_v2.indd

Add to Reading List

Source URL: stakeholder.affinitywater.co.uk

Language: English - Date: 2015-07-27 10:00:31
UPDATE