Security Information Service

Results: 3404



#Item
111

Additional Information SALES POLICY HONEYWELL ACCESS SYSTEMS SALES POLICY We at Honeywell Access Systems believe that service and

Add to Reading List

Source URL: www.security.honeywell.com

Language: English - Date: 2015-05-19 14:34:14
    112Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Enterprise application integration / SOA Security / Decentralization / Software as a service / Cloud computing

    Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

    Add to Reading List

    Source URL: servicetechmag.com

    Language: English - Date: 2012-04-24 20:38:15
    113Prevention / Security / Safety / Dian / Joint Services Publication 440 / Joint Service Publication / Information security / Freedom of information laws by country / Ministry of Defence

    Ministry of Defence Main Building (02/M) Whitehall London SW1A 2HB United Kingdom Ref. FOI

    Add to Reading List

    Source URL: www.whatdotheyknow.com

    Language: English - Date: 2015-04-16 20:30:58
    114Computer access control / Identity management / Computer security / Computing / Federated identity / SOA Security / Security Assertion Markup Language / WS-Security / Single sign-on / Identity management system / Service-oriented architecture / Information Card

    Dynamic Business Service Networks using Virtual Organisations

    Add to Reading List

    Source URL: www.crosschecknet.com

    Language: English - Date: 2010-01-11 16:40:17
    115Computer networking / Information appliances / Smartphones / Smart device / Internet of things / Smart environment / Ambient intelligence / Smart meter / Server / Android / Computer security / Web service

    A Magic Lens for Revealing Device Interactions in Smart Environments

    Add to Reading List

    Source URL: www.vs.inf.ethz.ch

    Language: English - Date: 2014-12-11 04:43:08
    116Crime prevention / Cryptography / Information governance / National security / Computer security / Internet privacy / Privacy / Information security / Intellectual property / Acceptable use policy / Information privacy law / Terms of service

    Box Acceptable Use Policy at the University of Utah Box.com is cloud storage that provides users with the ability to easily store, access and share files and folders anywhere they can connect to the Internet. As a user o

    Add to Reading List

    Source URL: it.utah.edu

    Language: English - Date: 2015-03-06 09:53:02
    117

    2012 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service

    Add to Reading List

    Source URL: www.aipsi.org

    Language: English
      118

      2012 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service

      Add to Reading List

      Source URL: www.security-finder.ch

      Language: English - Date: 2013-02-19 04:02:58
        119

        Denial of Service Attacks and Defenses The purpose of Information Technology is to enhance and streamline the core competencies of your business. However, when IT security is compromised, it quickly becomes priority one.

        Add to Reading List

        Source URL: www.casaba.com

        Language: English
          120

          TERMS OF USE Cumulo Information System Security GmbH (hereafter referred to as CUMULO) provides nimbusec as a service to monitor web applications. It can identify manipulated and hacked websites (malware, defacements, bl

          Add to Reading List

          Source URL: nimbusec.com

          Language: English - Date: 2016-02-04 06:05:17
            UPDATE