Security Information Service

Results: 3404



#Item
491Computer security / Cloud computing security / Tokenization / Software as a service / Centralized computing / Cloud computing / Computing

FACT SHEET Cloud Gateway Protect sensitive information before it gets to the cloud. Protegrity Cloud Gateway makes it easy to leverage tokenization,

Add to Reading List

Source URL: www.protegrity.com

Language: English - Date: 2015-01-20 12:48:20
492Crime prevention / Surveillance / Blue Card / Queensland / Identity document / Police / Homestead exemption in Florida / Security / Government / National security

Blue Card System | Information Sheet Exemption cards for police officers Police officers with the Queensland Police Service do not require an exemption card when providing child regulated services as part of their profe

Add to Reading List

Source URL: robinashs.eq.edu.au

Language: English - Date: 2013-05-16 08:41:23
493Backup software / Microsoft Windows / Windows XP / Office equipment / Backup / Data security / Recovery disc / HP OpenView / Personal computer / System software / Software / Computing

service reference guide x HP Compaq dc5750 Business PC 1st Edition This document provides information on the removal and replacement of all

Add to Reading List

Source URL: www.levnapc.cz

Language: English - Date: 2014-07-21 19:03:03
494Business / Content management systems / Mass surveillance / National security / Public records / National Security Agency / Records management / Records life-cycle / Cascading Style Sheets / Administration / Information technology management / Surveillance

DOCID: [removed]UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 1-6

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:42
495Government Accountability Office / United States Copyright Office / Information security / Librarian / Library of Congress / Inventory / Chief information officer / Congressional Research Service / Library / Library science / Science / Government

GAO[removed]Library of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-31 12:07:33
496Computer security / Cloud infrastructure / Computer network security / Amazon Elastic Compute Cloud / Security information and event management / Accelops / Managed security service / Virtual appliance / Managed services / Cloud computing / Computing / Software

CASE STUDY Referentia Builds Managed Security and Network Services in the Amazon EC2 Cloud with AccelOps

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-03 13:08:30
497Identity management systems / Self-service password reset / Password policy / Password / Security / Computer security

Creating a Unique Student Identifier (USI) Information You are able to create your Unique Student Identifier (USI) online. Before you begin you will need to know your personal details and have an Identification document

Add to Reading List

Source URL: ccg.asn.au

Language: English - Date: 2014-11-19 21:09:41
498Security / Web services / Service-oriented architecture / SOA Security / WS-Federation / Computer security / IBM / Enterprise service bus / Computing / Information technology management / Enterprise application integration

Colorado Software Summit: October 23 – 28, 2005 © Copyright 2005, IBM Corporation SOA Security Programming Model

Add to Reading List

Source URL: www.softwaresummit.com

Language: English
499Molecular biology / Humanitarian aid / Food politics / Genetic engineering / Tropical agriculture / International Service for the Acquisition of Agri-biotech Applications / Genetically modified organism / Genetically modified food / Food security / Biology / Food and drink / Agriculture

INFORMATION PAPER 8 Agricultural Biotechnology Council of Australia Developing countries and biotechnology

Add to Reading List

Source URL: www.abca.com.au

Language: English - Date: 2013-05-25 02:52:50
500Demographics of the United Kingdom / Censuses / Genealogy / Information security / Official statistics / Security service / Confidentiality / United Kingdom Census / Statistics / Demography / Survey methodology

Northern Ireland Census 2011 General Report 6 Confidentiality, Privacy and Security

Add to Reading List

Source URL: www.nisra.gov.uk

Language: English - Date: 2015-03-24 05:46:24
UPDATE