Security Information Service

Results: 3404



#Item
751Computer network security / Wireless / Networking hardware / Wi-Fi / Data security / Router / Wireless access point / Wireless security / Service set / Wireless networking / Technology / Computing

Information Security Animations – Security on Wi-Fi Setup (Script) Security on Wi-Fi Setup Wi-Fi refers to users using a wireless computer device to connect to the Internet via a wireless network router within the wir

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:37
752Security / Human rights / Data privacy / Law / Internet privacy / Identity theft / Personally identifiable information / Social networking service / Data breach / Ethics / Privacy law / Privacy

MAY 2011 — ISSUE 40 •[removed]! ISBN XXX-X-XX-XXXXXX-X APRIL 2012

Add to Reading List

Source URL: www.canberra.edu.au

Language: English - Date: 2012-04-26 23:12:41
753Aviation security / Year of birth missing / Place of birth missing / Sensitive Security Information / United States government secrecy / United States federal executive departments / Federal Air Marshal Service / John S. Pistole / Transportation Security Administration / United States Department of Homeland Security / Security / National security

AVIATION SECURITY ADVISORY COMMITTEE (ASAC)

Add to Reading List

Source URL: www.tsa.gov.

Language: English - Date: 2015-01-30 11:36:04
754Password / Wireless network / Wireless security / Wireless networking / Wi-Fi / Service set

Installation Guides - Information required for connection to the Goldfields Institute’s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields Institut

Add to Reading List

Source URL: www.goldfields.wa.edu.au

Language: English - Date: 2014-04-17 02:11:58
755International economics / Security / Computer security / Offshoring / Information security / Service-level agreement / Vulnerability / Managed security service / Cloud computing security / Outsourcing / Business / Management

Information Security Animations – IT Outsourcing Security (Script) IT Outsourcing IT outsourcing is to outsource all or part of the information technology (IT) services or functions to a third-party service provider.

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-06-20 06:06:51
756National security / South African Police Service / Security / New Zealand Police / Police / Law enforcement in South Africa / Crime in South Africa / Law

ANNUAL REPORT FOR[removed]FINANCIAL YEAR - VOTE 25: DEPARTMENT OF POLICE PART B: PERFORMANCE INFORMATION

Add to Reading List

Source URL: www.saps.gov.za

Language: English - Date: 2014-10-13 03:11:09
757Political geography / Political status of Taiwan / Center for Strategic and International Studies / Centre for Strategic and International Studies / Taiwan / Canadian Security Intelligence Service / Nuclear proliferation / Institute for Information Industry / Security studies / International relations / International security

Taiwan’s Marginalized Role in International Security: Paying a Price

Add to Reading List

Source URL: csis.org

Language: English - Date: 2015-02-27 09:22:10
758Ethics / Actuarial science / Security / Data security / Information security management system / Australian National Audit Office / Operational risk / Capability Maturity Model / Enterprise risk management / Risk / Management / Risk management

State of the Service Report State of the Service Series 2013–14 Effective leadership Diverse workforce Capable organisations and workforce Employee conditions APS Values

Add to Reading List

Source URL: www.apsc.gov.au

Language: English - Date: 2014-11-30 18:11:12
759Computer security / Computing / Security / Business / Computer network security / Business process outsourcing / Information security management system / Service-level agreement / Information security / Data security / Information technology management / Outsourcing

DOC Document

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:03
760National security / Computer security / Enterprise architecture / Information security / Enterprise architect / Critical infrastructure protection / Information Technology Infrastructure Library / Service-oriented architecture / Enterprise information security architecture / Information technology management / Security / Data security

Secure Your Information: Information Security Principles for Enterprise Architecture Report June 2007

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2014-09-17 21:03:01
UPDATE