Scio

Results: 778



#Item
641Business / Technology / Method engineering / Project portfolio management / Program management / Information Technology Infrastructure Library / Project manager / Information Services Procurement Library / Acquisition initiation / Project management / Management / Information technology management

NC-JOIN Metric Definition Plan

Add to Reading List

Source URL: www.epmo.scio.nc.gov

Language: English - Date: 2012-08-27 13:56:02
642Human development / Cyber-bullying / Bullying / Netsafe / Internet privacy / Internet safety / Social networking service / Internet security / Cybercrime / Abuse / Computer crimes

Enterprise Security and Risk Management Office Monthly Security Tips NEWSLETTER June 2013

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2013-07-03 12:08:14
643Wireless / Mobile telecommunications / Mobile computers / Bluetooth / Malware / Mobile computing / Mobile phone / Near field communication / USB flash drive / Technology / Mobile technology / Electronic engineering

ESRMO Monthly Security Tips NEWSLETTER June 2011

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2011-06-29 13:48:55
644Crime prevention / Public safety / Information security / National security / Computer security / Data security / Security

Assessment of Agency Compliance with Enterprise Security Standards

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2004-05-19 15:03:33
645World Wide Web / Social media / Privacy / Social information processing / Digital footprint / Marketing / Internet privacy / Social networking service / Identity theft / Computing / Identity / Ethics

Microsoft Word[removed]July - Managing Your Digital Footprint - Think Before You Post.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2012-07-24 14:28:34
646Java platform / Sun Microsystems / Computer network security / Computing platforms / Java / Spyware / WordPress / Malware / Java applet / Computing / Software / Cross-platform software

Microsoft Word - December 2010 Increase in Java Exploits.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-12-14 15:49:24
647Electronics / Information appliances / Mobile telecommunications / Wireless / Mobile computers / Near field communication / Personal digital assistant / Android / Wi-Fi / Technology / Smartphones / Computing

Microsoft Word[removed]February - How Do I Protect the Information on My Smartphone.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2013-02-25 15:57:45
648Computer security / Malware / Botnet / Internet security / Spyware / Computer worm / Attack / Rogue security software / Cloud computing / Computer network security / Cyberwarfare / Computing

Microsoft Word - January[removed]Cyber Security Trends.docx

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2010-02-26 07:44:00
649Confidence tricks / Crime / Business ethics / Email / Phishing / Internet fraud / Email fraud / Malware / Identity theft / Spamming / Cybercrime / Social engineering

Enterprise Security and Risk Management Office Monthly Security Tips NEWSLETTER April 2013

Add to Reading List

Source URL: www.esrmo.scio.nc.gov

Language: English - Date: 2013-04-23 17:17:12
650Business / Information technology management / Project management / Project portfolio management

New Procedures for requesting Project Portfolio Licenses ir Role Changes for Existing License Holders

Add to Reading List

Source URL: www.epmo.scio.nc.gov

Language: English - Date: 2010-07-21 13:11:14
UPDATE