Security Information Service

Results: 3404



#Item
461Marriage certificate / United States Postal Service / Marriage licence / Identity document / Marriage / Government / Public records / Security

NEW YORK STATE DEPARTMENT OF HEALTH Vital Records Section Mail-in Application for Copy of Marriage Certificate Information Page — Mail-in Application for Copy of Marriage Certificate

Add to Reading List

Source URL: www.health.ny.gov

Language: English - Date: 2012-05-29 11:49:36
462Accreditation / Quality assurance / Audit / Conformity assessment / Auditing / Information security / National Accreditation Board for Testing and Calibration Laboratories / Evaluation / Security / Standards

ACCREDITATION RULE 25 Issue Date: Implementation Date: Supersedes: SUBJECT: Accreditation Program for Information Technology Service Management Systems (ITSMS) APPLIES TO: ISO/IEC

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2015-01-02 19:53:18
463Government Accountability Office / United States Copyright Office / Information security / Librarian / Library of Congress / Inventory / Chief information officer / Congressional Research Service / Library / Library science / Science / Government

GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-03-31 12:07:33
464United States Office of Personnel Management / Director of National Intelligence / Information Sharing Environment / Office of Management and Budget / United States Department of Homeland Security / Security clearance / Government / Public administration / Civil service in the United States

Cross Agency Priority Goal Quarterly Progress Update Insider Threat and Security Clearance Reform Goal Leaders:

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2015-03-24 10:40:16
465Computing / Identity assurance / Liberty Alliance / Peer-to-peer / Security Assertion Markup Language / Cloud computing / Information Card / OpenID / Identity management / Identity / Computer security

A Field Guide to Internet Trust by Kaliya “Identity Woman” Hamlin and Steve Greenberg Summary The decreasing cost of computation and communication has made it easier than ever before to be a service provider, and has

Add to Reading List

Source URL: www.identitywoman.net

Language: English - Date: 2014-05-05 14:05:14
466Law / Privacy / Internet privacy / Records management / FTC Fair Information Practice / Information security / Ethics / Human rights / Identity management

Building Control – Privacy Notice Privacy Notice Throughout the web pages for our Building Control service you will find at various stages that you may be invited or required to provide information, sometimes personal

Add to Reading List

Source URL: www.bournemouth.gov.uk

Language: English - Date: 2015-03-30 13:14:50
467Credit card fraud / Personally identifiable information / Tax evasion / Identity theft / Special agent / Inspector General / Fraud / United States Secret Service / Data breach / Crimes / Law / Security

U.S. Department of Justice United States Attorney Southern District of Florida 99 N.E. 4 Street Miami, FL9001

Add to Reading List

Source URL: www.oig.dol.gov

Language: English - Date: 2015-04-09 13:50:28
468Computing / SecureWorks / Managed security service / Symantec / Security event manager / Magic Quadrant / Security operations center / Security information and event management / MSS / Computer security / Computer network security / Cyberwarfare

Magic Quadrant for Managed Security Services, Worldwide

Add to Reading List

Source URL: www.secureworks.com

Language: English - Date: 2015-01-21 09:17:00
469Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
470National security / Australian Security Intelligence Organisation / Legal aspects of computing / Australian Secret Intelligence Service / Crimes Act / Classified information / Counter-terrorism / Australian anti-terrorism legislation / Organised crime in Australia / Australian intelligence agencies / Government of Australia / Law

CYBERLIBERTIES IN THE WAKE OF A NATIONAL SECURITY "PUSH" Background Briefing Paper prepared by Oz NetLaw: internet law practice of the Communications Law Centre on behalf of the Baker & McKenzie Cyberspace Law and Policy

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2004-08-27 03:11:45
UPDATE