Security Information Service

Results: 3404



#Item
21Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
22Computing / Computer security / Computer network security / E-commerce / Cyberwarfare / Information privacy / Payment Card Industry Data Security Standard / Cogeco / Web application firewall / Application firewall / Peer 1 / Denial-of-service attack

COGECO_Peer_1_Logo_v2_WHITE

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:15
23Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
24Security / Computer security / Computing / Identity management / Privacy / Identity documents / Computer access control / Internet privacy / Personally identifiable information / United States Postal Service / HTTP cookie / Credit card

Microsoft Word - privacy_policy

Add to Reading List

Source URL: hotelnorthampton.com

Language: English - Date: 2012-11-30 09:33:52
25Information technology management / Information technology / ITIL / Computing / IT service management / Service desk / ISO/IEC 20000 / Cisco Systems / ITIL security management / Draft:Multimatics

www.soitron.com MANAGED PLATFORM SUPPORT SERVICES What We Do

Add to Reading List

Source URL: www.soitron.sk

Language: English - Date: 2016-04-20 07:41:49
26Security / Prevention / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Service assurance / Computer security

BUGYO_Beyond-leaflet-start.pub

Add to Reading List

Source URL: projects.celtic-initiative.org

Language: English - Date: 2009-06-19 12:31:10
27Fisheries law / Fishing / Fisheries science / Natural environment / Fishing industry / Natural resources / Personally identifiable information / Privacy / Endangered Species Act / Privacy Office of the U.S. Department of Homeland Security / MagnusonStevens Fishery Conservation and Management Act / National Marine Fisheries Service

Version Number: U.S. Department of Commerce NOAA NMFS Privacy Impact Assessment

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-07-26 15:07:51
28Information privacy / Payment cards / Computing / Business / Economy / Computer law / E-commerce / Payment Card Industry Data Security Standard / Peripheral Component Interconnect / Qualys / Conventional PCI / Payment card industry

PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-03-18 15:34:30
29Broadband / Economy / Structure / Technology / National Telecommunications and Information Administration / Innovation / Internet access / Competitiveness / Sustainability / National broadband plan / Broadband universal service

“The vows of this nation can only be fulfilled if we are first, and therefore, we intend to be first. Our leadership in science and in industry, our hopes for peace and security, our obligations to ourselves as well as

Add to Reading List

Source URL: www.democraticleader.gov

Language: English - Date: 2016-02-02 12:39:28
30Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-11 12:48:40
UPDATE