Security Information Service

Results: 3404



#Item
611Software bugs / Internet standards / Units of information / Denial-of-service attacks / SQL Slammer / Computer network security / Witty / Stack buffer overflow / User Datagram Protocol / Computing / Network architecture / Internet

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 CHIBA WITTY BLUES Peter Ferrie, Frédéric Perriot, Péter Ször Symantec, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
612Backup software / Data management / Computer data / Cloud storage / Backup / Data security / United Bank for Africa / Off-site data protection / Remote backup service / Computing / Data / Information

Case Study DATAFORT UBA Secures continued FCA Compliance with a new Business Continuity solution

Add to Reading List

Source URL: www.datafort.co.uk

Language: English - Date: 2014-06-12 07:29:07
613Government / Transport / Traffic law / Electric bicycle laws / Motor vehicle declared out of service / Department of Motor Vehicles / Identity document / Security

South Carolina General Assembly 121st Session, [removed]H[removed]STATUS INFORMATION

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2015-01-30 10:19:00
614Computer security / Identity management systems / Identity management / Identity / Information security / Provisioning / Single sign-on / Password / Service-oriented architecture / Security / System software / Computing

SailPoint IdentityIQ™ P R O D UC T B R O C H UR E A Smarter Way to Manage Identity COMPLIANCE MANAGER

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2014-07-24 05:34:12
615Computing / Data security / Computer security / Crime prevention / National security / Security service / Message authentication code / Virtual private network / Public-key cryptography / Computer network security / Cryptography / Security

The use of information technology standards to secure telecommunication networks

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-05-25 16:54:07
616Automated Systems Holdings Limited / Computer network security / Public safety / Information security / Security information and event management / Managed security service / Security operations center / PCCW Solutions / Computer security / Security / Data security

[For Immediate Release] AUTOMATED OPENS SECURITY OPERATION CENTER IN HONG KONG TO PROVIDE MANAGED SECURITY SERVICES * *

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-23 00:03:31
617Management / Disaster preparedness / Emergency management / Humanitarian aid / Occupational safety and health / Service / Information Technology Infrastructure Library / Security guard / Public safety / Information technology management / Business

S P E C I A L I S I N G I N FA C I L I T Y S E R V I C ES Our coverage TJS is a national organisation with regional offices

Add to Reading List

Source URL: www.tjsservices.co

Language: English - Date: 2014-05-14 08:10:40
618Configuration management / Network performance / Computer security / Business analytics / Converged infrastructure / Configuration management database / Business intelligence / Infrastructure optimization / HP Software Division / Computing / Cloud computing / Information technology management

2015 EMA™ Research Studies Application & Business Services Redefining IT Service Management (ITSM) Quarter 1 Dennis Drogseth

Add to Reading List

Source URL: www.enterprisemanagement.com

Language: English - Date: 2014-11-05 13:41:05
619Public safety / Electronic commerce / Computing / Computer security / Information security / Communications protocol / Service-oriented architecture / SmoothIT project / Security / Crime prevention / National security

C:/Qut/Thesis_New/Thesis.dvi

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:10:52
620Load balancing / Network management / Routing / Application firewall / High availability / Information technology management / Denial-of-service attack / Provisioning / Speedera Networks / System software / Computing / Computer network security

Datasheet Enterprise Plans For the Most Serious Online Businesses Online businesses require powerful tools to ensure the highest

Add to Reading List

Source URL: www.incapsula.com

Language: English
UPDATE