Operations security

Results: 5095



#Item
161

Gregory J. Touhill Deputy Assistant Secretary for Cybersecurity Operations and Programs Office of Cybersecurity and Communications National Protections and Programs Directorate Department of Homeland Security Brigadier G

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-01-12 13:39:09
    162

    Factsheet Airlock Operations App The Airlock Operations App for use with Splunk® Enterprise provides aggregated management reports of security issues and application usage. The various dashboards allow network administ

    Add to Reading List

    Source URL: www.airlock.com

    Language: English - Date: 2015-07-08 10:58:02
      163

      THE WILDLIFE CONSERVATION AND MANAGEMENT ACT (No. 47 ofWILDLIFE CONSERVATION AND MANAGEMENT (SECURITY OPERATIONS) REGULATIONS, 2015 ARRANGEMENT OF REGULATIONS

      Add to Reading List

      Source URL: www.laikipia.org

      Language: English - Date: 2015-09-15 08:06:19
        164

        The Security of Data Recovery Operations

        Add to Reading List

        Source URL: www.drivesaversdatarecovery.com

        Language: English - Date: 2015-11-04 20:14:02
          165

          Building a SOC “Let us find your vulnerabilities before anyone else does.” Computer Network Defence Ltd’s (CND) Security Operations Centre (SOC) Service is a framework which provides clients with the design, delive

          Add to Reading List

          Source URL: www.cndltd.com

          Language: English - Date: 2014-08-15 16:51:06
            166

            Statement Submitted by Witold Skwiercznyski, President National Council of Social Security Field Operations Locals, AFGE, AFL-CIO Before the Senate Special Committee on Aging June 18, 2014

            Add to Reading List

            Source URL: www.afgec220.org

            Language: English - Date: 2014-06-25 13:34:09
              167Software quality / Quality assurance / Software assurance / Process management / IEEE standards / Management / Concept of operations / Vulnerability / Computer security / Critical infrastructure protection

              Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

              Add to Reading List

              Source URL: swa.omg.org

              Language: English - Date: 2006-12-14 08:55:32
              168

              Security Intelligence: 5G/SOC James Blake PhD CISSP CISM CEH GCIH CCSK ITIL-F Managing Principal EMEA HP Security Intelligence & Operations Consulting © Copyright 2013 Hewlett-Packard Development Company, L.P. The info

              Add to Reading List

              Source URL: www.hpevents.co.za

              Language: English - Date: 2014-06-27 09:03:50
                169

                Information sharing: EMSA’s experience Regional Maritime Security Organisations Round Table Meeting Leendert Bal / Head of Department Operations

                Add to Reading List

                Source URL: www.cjoscoe.org

                Language: English - Date: 2015-09-29 07:48:12
                  170Modeling and simulation / United States Army Tank Automotive Research /  Development and Engineering Center / Warren /  Michigan / Operations security / United States Army TACOM Life Cycle Management Command / Security

                  PDF Document

                  Add to Reading List

                  Source URL: www.ndia-mich.org

                  Language: English - Date: 2013-08-20 07:59:50
                  UPDATE