Security Information Service

Results: 3404



#Item
381Microsoft Office 365 / Personal information managers / File hosting / Outlook Web App / Microsoft SharePoint / Exchange ActiveSync / Azure Services Platform / Office Web Apps / Microsoft Online Services / Cloud computing / Software / Computing

Electronic Business Solutions Limited 1. Service Category (A) Productivity Apps Table 1a: Productivity Apps Items (Service items passing all General, Security and Technical Requirements)

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2012-12-09 19:56:20
382Privacy law / Government / Taxation in the United States / Social Security / Social Security number

RESET Department of the Treasury Bureau of the Fiscal Service Authorization for Release of Information

Add to Reading List

Source URL: www.fiscal.treasury.gov

Language: English - Date: 2015-04-08 11:38:40
383Computer security / Vulnerability / Cyberwarfare / Failure / Canoe England / British Canoe Union / Independent Safeguarding Authority

The Disclosure & Barring Service (DBS) - Frequently Asked Questions A DBS Disclosure is a document that contains information held by police and Government Departments that can be used by employers and voluntary organisat

Add to Reading List

Source URL: www.bcu.org.uk

Language: English - Date: 2013-03-20 07:25:33
384Federal Information Security Management Act / Information security / Vulnerability / Penetration test / Managed security service / Security risk / Application security / Security testing / Security controls / Computer security / Security / Cyberwarfare

Spotlight on Security A Modern Approach to Threat Protection, Detection, and Reactionwww.pcconnection.com

Add to Reading List

Source URL: info.pcconnection.com

Language: English - Date: 2015-04-14 09:10:28
385Crime prevention / Surveillance / Law enforcement in the United Kingdom / Metropolitan Police Service / Security guard / Scenes of Crime Officer / Police officer / Organized crime / Police / Security / Law enforcement / National security

Application for Accreditation of Prior Learning Jason Hurst Contents 1. Personal information 2. Employment

Add to Reading List

Source URL: www.port.ac.uk

Language: English - Date: 2013-10-22 06:21:32
386Computing / Denial-of-service attack / Malware / Application security / Attack / Vulnerability / Internet security / Bitcoin / Microsoft Security Essentials / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The Attackers Behind PlugX In this report, we present survey results and background information on the attackers behind the PlugX

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-07-01 22:18:06
387Cyberwarfare / Crime prevention / National security / Electronic commerce / Denial-of-service attack / Intrusion prevention system / Information security / Penetration test / Prolexic Technologies / Computer network security / Security / Computer security

SOLUTION BRIEF DDoS Protection Services LOCAL SERVICE COAST TO COAST

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2015-02-26 10:56:26
388NHS Constitution for England / Caldicott guardian / Information security / Public safety / Health / NHS Confederation / Health and Social Care Bill / National Health Service / NHS England / Security

Microsoft Word - IG Policy V2.0

Add to Reading List

Source URL: www.england.nhs.uk

Language: English - Date: 2014-06-27 10:26:52
389Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
390Outsourcing / Criminal Justice Information Services Division / Service-level agreement / Cloud storage / Federal Bureau of Investigation / Criminal record / Cloud computing security / Cloud backup / Cloud computing / Centralized computing / Computing

Microsoft Word - Cloud Computing PrinciplesFINAL

Add to Reading List

Source URL: dnnnzlqmv.cloudapp.net

Language: English - Date: 2014-01-16 10:54:30
UPDATE