Information security standards

Results: 2339



#Item
331Computer security / Standards / Computing / Security / Information Systems Audit and Control Association / Corporate governance of information technology / Certified Information Security Manager / CISA / Certified Information Systems Auditor / Data security / Auditing / Information technology audit

Welcome Remarks by Dr. Jabiri Kuwe Bakari, CEO – e-Government Agency and Vice President, ISACA Tanzania Chapter on the Occasion of Annual General Meeting, Held on January 21st , 2015 at Double Tree Hotel, Dar-es-Salaam

Add to Reading List

Source URL: www.ega.go.tz

Language: English - Date: 2015-01-21 04:25:54
332Business / Quality / Data security / Counterfeit medications / ISO / Information security management system / Certification / Management / Evaluation / Business software / Sproxil

Protecting Brands Globally™ FOR IMMEDIATE RELEASE Sproxil Earns International Standards for Quality Management and ISMS Certifications Completes ISO27001 and ISO9001 International Standard Requirements

Add to Reading List

Source URL: sproxil.com

Language: English - Date: 2014-10-22 10:01:22
333National security / Computing / Public safety / Computer security / ISO standards / Wireless security / Portable Document Format / Information security / Security / Computer network security / Crime prevention

Paper Submission Guidelines For Info-Security Booklet 2014 Content The handbook will cover all topics related to the latest security technology and trends. The primary focus is on high-quality original research, case stu

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:07:35
334Internet / Network architecture / Computer networking / Network performance / Internet protocols / Internet standards / Information security audit / Proxy server / Computing / Password / Server

5 POINT AG Security Statement For his teamspace services the manufacturer 5 POINT AG (‘5 POINT’) utilizes some of the most advanced technology for Internet security available today. Each team can choose three differ

Add to Reading List

Source URL: www.teamspace.com

Language: English - Date: 2010-02-25 05:28:16
335Computing / Domain name system / Dynamic Host Configuration Protocol / Domain Name System Security Extensions / Information Technology Infrastructure Library / Internet / Internet standards / Network architecture

Professional  Services  Consultant   About  us     EfficientIP   hardware   and   software   solutions   are   developed   to   facilitate   the   management   of  

Add to Reading List

Source URL: www.efficientip.com

Language: English - Date: 2014-07-01 04:26:19
336Auditing / Data security / Information technology audit

TruckSafe Management Standards A.1 Management Policy & Procedure. The operator must implement, maintain and control policies and procedures to ensure that the operation meets industry standards. The procedures must cover

Add to Reading List

Source URL: www.trucksafe.com.au

Language: English
337Caregiver / Yooralla / Freedom of Information Act / Threat / Online shopping / Right to Information Act / Cyberwarfare / Law / Freedom of information legislation / Computer security / Family

Open Disclosure Policy Index: Management Relevant Legislation, Standards and Agreements The following Legislation applies to this policy and supporting documentation: Charter of Human Rights and Responsibilities Act 20

Add to Reading List

Source URL: www.yooralla.com.au

Language: English - Date: 2015-04-08 23:20:14
338Technology / Payment systems / Finance / Espionage / Hardware security module / Smart cards / Magnetic stripe card / MasterCard / Contactless smart card / ISO standards / Ubiquitous computing / EMV

Simplify the complexity of EMV data preparation Prime Factors makes legacy-system EMV data preparation as easy and familiar as magnetic stripe is today. Now you can control your most sensitive and proprietary information

Add to Reading List

Source URL: primefactors.com

Language: English - Date: 2013-05-09 18:04:22
339Crime prevention / National security / Computer network security / Cyber security standards / Computer insecurity / Social vulnerability / Security / Cyberwarfare / Computer security

cybersecurity.t halesgroup.com.au Enabling utility providers to understand if they are at risk of cyberattack and position themselves to handle the added security challenges of merging operational and information techno

Add to Reading List

Source URL: cybersecurity.thalesgroup.com.au

Language: English - Date: 2014-10-30 20:24:40
340Standards / Data security / Computing / Security / Privacy policy / Information privacy / Professional certification / Certified Information Systems Security Professional / Internet privacy / Ethics / Privacy / International Association of Privacy Professionals

IAPP PRIVACY CERTIFICATION CANDIDATE HANDBOOK Background, Procedures and Policies © 2014 by the International Association of Privacy Professionals, All Rights Reserved

Add to Reading List

Source URL: privacyassociation.org

Language: English - Date: 2014-10-24 15:36:57
UPDATE