Operations security

Results: 5095



#Item
101Privacy of telecommunications / Mass surveillance / National security / Computer surveillance / Crime prevention / Lavabit / National Security Agency / Edward Snowden / Tailored Access Operations / PRISM / Qwest / Surveillance

Schneier on Security: More on the NSA Commandeering the Internet

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-09-11 13:58:48
102Employment compensation / Expense / Payroll / Social Security / Email

State Controller’s Office PPSD/Operations Bureau Escalation Email Guidelines and Contact List To better serve state Human Resources (HR) Offices, the Personnel/Payroll Services Division, Operations Bureau has establish

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2016-08-18 20:01:32
103United States Department of Homeland Security / Office of Biometric Identity Management / Visa Waiver Program / Visa policy of the United States / Form I-94 / U.S. Immigration and Customs Enforcement / Student and Exchange Visitor Program / U.S. Customs and Border Protection / CBP Office of Field Operations / Travel visa / United States Citizenship and Immigration Services / Illegal immigration

________________________________________________________________________ JOINT STATEMENT OF KELLI ANN BURRIESCI Deputy Assistant Secretary for Screening Coordination Office of Policy

Add to Reading List

Source URL: docs.house.gov

Language: English
104Management / Security / Project management / Risk / Systems engineering / Emergency management / Risk management / Air traffic control / Resilience / Goal

BALANCING GOAL TRADE-OFFS WHEN DEVELOPING RESILIENT SOLUTIONS: A CASE STUDY OF RE-PLANNING IN AIRLINE OPERATIONS CONTROL 1 Floor Richters , Jan Maarten Schraagen 1

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:36:02
105United States housing bubble / Systemic risk / Funds / Subprime mortgage crisis / Structured finance / Bond / Security / Credit rating agency / Money market fund / Investment / High-yield debt / Real estate mortgage investment conduit

CITY OF WESTON FINANCIAL POLICIES The financial policies as outlined herein are the basis of the daily operations of the City of Weston. The policies establish objectives and provide guidelines and specific rules necessa

Add to Reading List

Source URL: www.westonfl.org

Language: English - Date: 2015-06-26 11:07:02
106Mathematical optimization / Operations research / Stochastic optimization / Stochastic programming / Second-order cone programming / Wind power / Stochastic process / Electric generator

Unit Commitment with N-1 Security and Wind Uncertainty Kaarthik Sundar‡ , Harsha Nagarajan† , Miles Lubin¶ , Line Roald§ , Sidhant Misra† , Russell Bent† , Daniel Bienstock$ † Los Alamos National Laboratory,

Add to Reading List

Source URL: www.pscc-central.org

Language: English - Date: 2016-07-01 02:37:33
107Customs services / U.S. Customs and Border Protection / United States Department of Homeland Security / Office of Inspector General / CBP Office of Field Operations

H O M E L A N D S E C U R I T Y A D V IS O R Y COUNCIL INTERIM REPORT OF THE CBP INTEGRITY ADVISOR Y PANEL

Add to Reading List

Source URL: soboco.org

Language: English - Date: 2015-06-30 18:15:41
108Surveillance / Data security / System administration / Splunk / Cyberwarfare / Computer network security / Computer security / Security operations center / Security / Information security operations center / International Multilateral Partnership Against Cyber Threats

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
109Computer security / Computer network security / Data security / Cryptography / National security / Information security operations center / Information security / Payment Card Industry Data Security Standard / Security information and event management / Intrusion detection system / Security / Threat

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
110Security / Cryptography / Cybercrime / Password / National security / WIC / Computer security / Health information exchange / Electronic health record

Local Health Operations Table of Contents

Add to Reading List

Source URL: chfs.ky.gov

Language: English - Date: 2016-08-16 14:50:57
UPDATE