Security Information Service

Results: 3404



#Item
271Computer security / Crime prevention / Data security / National security / Information security management system / Managed security service / Security management / Information security / Security operations center / Security / Cyberwarfare / Computer network security

283 Hitachi Review Vol), No. 5 Featured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:08
272Crime prevention / National security / Computer network security / Public safety / Ethics / Information security / National Oceanic and Atmospheric Administration / Security controls / National Ocean Service / Security / Computer security / Data security

Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-05-12 14:54:35
273Electronic commerce / Public-key cryptography / Borders of the United States / Electronic data interchange / Information / Public key infrastructure / Australian Customs and Border Protection Service / U.S. Customs and Border Protection / National security / Customs services / Computing / Key management

Microsoft Word - ACCA2011_10.doc

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2011-09-12 21:41:47
274Department for Work and Pensions / Pensions Act / UK State Pension / Pension / Family Resources Survey / Housing Benefit / Social security / Ros Altmann / Pensions in Spain / Pensions in the United Kingdom / United Kingdom / National Employment Savings Trust

Centre for Policy on Ageing Information Service Selected Readings Pensions and Benefits August 2014

Add to Reading List

Source URL: www.cpa.org.uk

Language: English - Date: 2014-08-29 06:26:09
275Security / Employer Identification Number / Data Universal Numbering System / Commercial and Government Entity / Taxpayer Identification Number / United States Government Printing Office / Government / Internal Revenue Service / Identification / Universal identifiers / Taxation in the United States / Information

Frequently Used GPO Accounting Codes Description of Number GPO’s Number Issued by

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2015-04-16 16:18:51
276Business software / Microsoft Dynamics CRM / Accounting software / Microsoft Dynamics / Multiple listing service / Customer relationship management / Microsoft / Microsoft Dynamics ERP / Multilevel security / Business / Marketing / Information technology management

Case Study: One of the Nation’s Largest MLS Providers Uses Altico’s Relationship Management Solution and Microsoft Dynamics CRM to Manage their Complex Subscriptions and Business Activity es as well as their broker a

Add to Reading List

Source URL: www.alticoadvisors.com

Language: English - Date: 2013-06-27 14:51:17
277Network protocols / Tunneling protocols / Multiprotocol Label Switching / Border Gateway Protocol / Label switching / Quality of service / Routing / Label Distribution Protocol / MPLS-TP / Network architecture / Computing / Internet standards

Malicious MPLS Policy Engine Reconnaissance A. Almutairi1 and S. Wolthusen1,2 1 Information Security Group Royal Holloway, University of London, UK

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-23 18:08:02
278Information technology management / Business / Finance / Information technology audit / Auditing / Statement on Auditing Standards No. 70: Service Organizations / Payment card industry / Payment Card Industry Data Security Standard / Document management system / Payment systems / Credit cards / Data privacy

DataBank National Document Management Company Receives SAS 70 Type II Certification RMS International awards DataBank IMX an unqualified opinion for securing and protecting client documentation during the conversion of d

Add to Reading List

Source URL: databankimx.web12.hubspot.com

Language: English - Date: 2012-08-02 14:50:13
279Wireless sensor network / Computing / Security / Network topology / Secure communication / Mesh networking / ANT / Denial-of-service attack / Computer security / Computer network security / Wireless networking / Technology

Weaponizing Wireless Networks: An Attack Tool for Launching Attacks against Sensor Networks Thanassis Giannetsos and Tassos Dimitriou Athens Information Technology Algorithms & Security

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:42:30
280Death Master File / Social Security Administration / National Technical Information Service / Static single assignment form / SubStation Alpha / Government / Economy of the United States / Politics of the United States / Social Security / Genealogy / Taxation in the United States

U.S. Department of Commerce National Technical Information Service Alexandria, VAIMPORTANT NOTICE On November 1, 2011, the Social Security Administration (SSA) implemented an important change in

Add to Reading List

Source URL: www.ntis.gov

Language: English - Date: 2014-04-03 17:19:12
UPDATE