Infrastructure security

Results: 6100



#Item
661Positive psychology / Psychological resilience / Resilience / Adaptation to global warming / Social vulnerability / Security / Emergency management / Public safety / Motivation

Infrastructure Resilience – JanuaryThe National Infrastructure Unit

Add to Reading List

Source URL: www.infrastructure.govt.nz

Language: English - Date: 2014-03-10 22:41:57
662Identity management / Identity management systems / Spamming / Federated identity / Email / Security Assertion Markup Language / Phishing / SAML 2.0 / Qualys / Computer security / Computing / System software

Security and Privacy Technology & Infrastructure Military Grade Encryption Cotap encrypts data in transit and at rest using AES 256-bit with perfect forward secrecy key

Add to Reading List

Source URL: info.cotap.com

Language: English - Date: 2015-05-24 17:10:19
663Computing / Network security / AlgoSec / Infrastructure optimization / Firewall / Verizon Communications / Computer network security / Security / Computer security

network on white background. Isolated 3D image

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-11-27 05:05:07
664Military science / Defense Information Systems Agency / Cyberterrorism / Information warfare / Computer security / Critical infrastructure protection / Proactive Cyber Defence / Cyberwarfare / National security / Security

FOR IMMEDIATE RELEASE March 8, 2000 CONTACT: Maureen Cragin Ryan Vaart

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
665European Union / Group on Earth Observations / Geography / Global Monitoring for Environment and Security / Europe / Infrastructure for Spatial Information in the European Community / Societal Benefit Areas / GOOS / Framework Programmes for Research and Technological Development / Remote sensing / Geographic information systems / Global Earth Observation System of Systems

EUROPEAN COMMISSION Brussels, SWDfinal

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-10 10:31:08
666Identity document / Authentication / Identity management / Information Technology Infrastructure Library / Identity score / Security / Identity / Cryptography

Microsoft Word 620529DB - Information for the State Sector.doc

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2011-01-31 16:09:34
667National security / United States Department of Homeland Security / Emergency management / Homeland security / United States Coast Guard / Homeland defense / Critical infrastructure protection / Homeland Security Act / Public safety / Civil defense / Law enforcement in the United States

For Official Use Only Until Released by the Senate Armed Services Committee STATEMENT OF

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
668Dow Jones Industrial Average / Microsoft / Economy of the United States

SecureGUARD Expands Channel to Africa with 3DR Partnership Linz, Austria (March 4, 2015) SecureGUARD GmbH, the manufacturers of turnkey security and cloud infrastructure products based on Microsoft technologies today an

Add to Reading List

Source URL: www.secureguard.at

Language: English - Date: 2015-04-21 08:08:24
669Computer architecture / Android / Antivirus software / Embedded Linux / Cloud clients / Android Market / Malware / Microsoft Security Essentials / Mobile virus / Software / Smartphones / Computing

On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

Add to Reading List

Source URL: www.enck.org

Language: English
670Risk / Information technology management / Certified Information Security Manager / Computer-aided audit tools / Internal audit / Audit / External auditor / Information technology audit process / Information Systems Audit and Control Association / Auditing / Information technology audit / Accountancy

ASSISTANT INFORMATION SYSTEMS AUDITOR – HR/AISAReporting to the Information Systems Auditor, the holder will undertake reviews of the NKCC’s ICT infrastructure and provide assurance to management on the a

Add to Reading List

Source URL: newkcc.co.ke

Language: English - Date: 2015-02-10 12:33:55
UPDATE