Secure environment

Results: 679



#Item
171

My Kids And Me A group for parents who have had their children removed from their care This program takes place in a secure and safe environment and assist participants to identify their parenting skills, strengths and r

Add to Reading List

Source URL: www.catholiccare.woll.catholic.org.au

    172Energy development / Environment of Australia / Climate change / Climate change in Australia / Adaptation to global warming in Australia / Climate change policy / Technology / Sustainable energy

    Green Cross Australia Submission: Queensland Government climate change strategy Background Green Cross Australia‟s mission is to foster a global values shift towards a secure and sustainable future. In Australia our wo

    Add to Reading List

    Source URL: greencrossaustralia.org

    Language: English - Date: 2014-08-06 19:33:48
    173IBM cloud computing / LandWarNet / Centralized computing / Cloud computing / Computing

    March[removed]The Army Cloud Computing Strategy What is it? The Army Cloud Computing Strategy sets the strategic direction and guidance to posture the Army for maintaining a secure operating environment while transitioning

    Add to Reading List

    Source URL: ciog6.army.mil

    Language: English - Date: 2015-03-27 12:35:34
    174Internet standards / Password / Internet / Computing / Transport Layer Security / Unisys / Data / SAP Logon Ticket / Password manager / Cryptographic protocols / Secure communication / Internet protocols

    UserSock Client User Validation UserSock is a client user validation tool that provides a TCP/IP socket interface to client applications in a client-server environment. Because users using client-server applications bypa

    Add to Reading List

    Source URL: www.locumsoftware.co.uk

    Language: English - Date: 2015-02-02 10:21:03
    175Backup software / Virtual machines / Computer storage / Data synchronization / Replication / Backup / Disaster recovery / Xen / CA ARCserve / System software / Computing / Software

    Use Case Business Need • Redundant copies of critical VMs kept in a secure, remote environment • Frequent scheduled updates to keep remote replicas up to date • Rapid recovery to meet strict RTOs

    Add to Reading List

    Source URL: quadricsoftware.com

    Language: English - Date: 2014-12-05 10:56:42
    176Data synchronization / Internet protocols / Secure communication / Exchange ActiveSync / ActiveSync / Network architecture / Internet Information Services / Domain Name System / HTTP Secure / Computing / Software / Mobile software

    This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview .....................................................................

    Add to Reading List

    Source URL: www.mailenable.com

    Language: English - Date: 2012-05-08 00:09:18
    177Smartphones / Data security / Software testing / Vetting / Vulnerability / Application security / Application software / IOS / Information security / Computing / Security / Computer security

    Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-03-19 09:48:47
    178Protected areas of Queensland / Protected areas of Western Australia / Conservation in Australia / Bush family / Bush Heritage Australia / George W. Bush / Carnarvon Station Reserve / Gondwana Link / Kojonup Reserve / Geography of Australia / States and territories of Australia / Environment of Australia

    Annual Report 2011– 2012 Our purpose To secure a suite of Australia’s unique plants, animals, ecosystems and landscapes

    Add to Reading List

    Source URL: www.bushheritage.org.au

    Language: English
    179Sport / Australian Olympic Committee / Oceania / Sports / Australia / Independent Sport Panel Report / Aspire Dome / Australian Sports Commission / Sport in Australia / Australian Institute of Sport

    CONTENTS Introduction Backdrop The Social and Economic Environment The Challenges Our Mission

    Add to Reading List

    Source URL: secure.ausport.gov.au

    Language: English - Date: 2009-10-14 23:59:09
    180Internet / Computer network security / Internet protocols / Internet privacy / Secure communication / IPsec / Transport Layer Security / Voice over IP / Virtual private network / Computing / Cryptographic protocols / Data

    SOLUTION BRIEF SECURE MOBILITY SOLUTIONS ASSURED MOBILE ENVIRONMENT HARDENING COMMERCIAL DEVICES FOR UP TO CLASSIFIED USE

    Add to Reading List

    Source URL: www.motorolasolutions.com

    Language: English - Date: 2015-03-16 17:29:28
    UPDATE