Security Information Service

Results: 3404



#Item
501Government Accountability Office / United States Copyright Office / Information security / Librarian / Library of Congress / Inventory / Chief information officer / Congressional Research Service / Library / Library science / Science / Government

GAO[removed]Library of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: www.gao.gov.

Language: English - Date: 2015-03-31 12:07:33
502Computer security / Workday /  Inc. / Data security / Security / David Duffield / Software as a service / Information security / Cloud computing / Computing / Centralized computing

Ernst & Young LLP Suite[removed]Mission Street San Francisco, CA[removed]

Add to Reading List

Source URL: www.workday.com

Language: English - Date: 2015-01-29 18:01:19
503Computing / Firewall / Internet security / Personal firewall / Circuit-level gateway / Application-level gateway / Stateful firewall / TCP/IP model / Denial-of-service attack / Computer network security / Computer security / Cyberwarfare

Firewall Q&A The Internet has made large amounts of information available to the average computer user at home, in business and in education. For many people, having access to this information is no longer just an advant

Add to Reading List

Source URL: www.vicomsoft.com

Language: English - Date: 2011-05-13 11:59:04
504Backup / Remote backup service / Information technology management / Data deduplication / ExaGrid / Backup software / Data security / Computing

Use Case Business Need • Backup virtual machines running on hosts/pools in multiple remote locations to a central storage location • Bandwidth efficient network transfers

Add to Reading List

Source URL: quadricsoftware.com

Language: English - Date: 2014-12-05 10:56:42
505Government / Inspector General / Official Information Act / Central Intelligence Agency / New Zealand Security Intelligence Service / Public administration / Security / New Zealand intelligence agencies / Inspector-General of Intelligence and Security / Government Communications Security Bureau

No 310 House of Representatives Supplementary Order Paper Tuesday, 6 August 2013

Add to Reading List

Source URL: www.legislation.govt.nz

Language: English - Date: 2013-08-05 21:38:40
506System software / Data security / Data synchronization / Remote backup service / Backup / Cloud storage / Incremental backup / File Transfer Protocol / File server / Computing / Backup software / Software

Offsite Backup: Benefits and Threats Unveiled http://www.softwaretalks.com/offsite-backup/ Good backup habits are essential to everyone who uses a computer with important information. It takes just a few accidental click

Add to Reading List

Source URL: www.softwaretalks.com

Language: English - Date: 2006-05-06 04:02:58
507Healthcare in Australia / Social Security / Health Care Card / Credit card / Income tax in Australia / Medicine / Health care / Medicare / Value added tax / Health / Politics of Australia / Australia

Financial Services & Concessions Where to access information on Financial Counselling, Financial Assistance and Concessions. HEALTH CONCESSIONS Service Contact Details

Add to Reading List

Source URL: www.whealth.com.au

Language: English - Date: 2012-03-27 22:46:00
508Biofuels / Business / Subsidies / Economy of Africa / World food price crisis / Agriculture in India / Food Corporation of India / Buffer stock scheme / Food security / Economics / Food politics / Pricing

LOK SABHA SECRETARIAT PARLIAMENT LIBRARY AND REFERENCE, RESEARCH, DOCUMENTATION AND INFORMATION SERVICE (LARRDIS) MEMBERS’ REFERENCE SERVICE

Add to Reading List

Source URL: 164.100.47.134

Language: English - Date: 2013-08-06 05:32:04
509Transmission Control Protocol / Computer network security / IPv4 / Network packet / Retransmission / Denial-of-service attacks / Sliding window protocol / IPv6 packet / Network architecture / Computing / Information

Independent Submission Request for Comments: 5841 Category: Informational ISSN: [removed]R. Hay

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-04-01 13:37:28
510Management / Law / Outsourcing / Service-level agreement / Subcontractor / Business process outsourcing / Information security management system / Contract law / Information technology management / Business

STM[removed]Security and Trust in IT Business Outsourcing: a Manifesto 6 Y. Karabulut 1 F. Kerschbaum 2 P. Robinson 4 SAP Research

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:28:02
UPDATE