Security Information Service

Results: 3404



#Item
831Computer network security / Contract law / Information technology management / Outsourcing / Service-level agreement / Security token / Information security / Integrated Windows Authentication / Public key infrastructure / Cryptography / Security / Computer security

STANDARD TERMS AND CONDITIONS

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:36:59
832Government / Transportation Security Administration / Visible Intermodal Prevention and Response team / Aviation security / Critical infrastructure protection / Federal Air Marshal Service / Sensitive security information / National security / Security / United States Department of Homeland Security

Statement of John S. Pistole Administrator Transportation Security Administration U.S. Department of Homeland Security before the United States Senate

Add to Reading List

Source URL: www.tsa.gov.

Language: English - Date: 2012-10-16 07:20:22
833Transportation in the United States / Aftermath of the September 11 attacks / Crime prevention / Transportation Security Administration / Sensitive Security Information / Federal Air Marshal Service / Full body scanner / Airport security / Robert MacLean / Security / Aviation security / United States Department of Homeland Security

GAO[removed], AVIATION SECURITY: TSA Should Take Additional Action to Obtain Stakeholder Input when Modifying the Prohibited Items List

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2015-03-06 11:00:11
834Government / Transportation Security Administration / Visible Intermodal Prevention and Response team / Aviation security / Critical infrastructure protection / Federal Air Marshal Service / Sensitive security information / National security / Security / United States Department of Homeland Security

Statement of John S. Pistole Administrator Transportation Security Administration U.S. Department of Homeland Security before the United States Senate

Add to Reading List

Source URL: www.tsa.gov.

Language: English - Date: 2012-10-16 07:20:27
835Data privacy / Confidentiality / Journalism sourcing / Secrecy / Personally identifiable information / Internet privacy / Privacy / De-identification / Information security / Ethics / Applied ethics / Security

National Statistical Service Confidentiality 1

Add to Reading List

Source URL: www.nss.gov.au

Language: English - Date: 2015-02-25 19:38:48
836United States Department of Homeland Security / Aftermath of the September 11 attacks / Transportation Security Administration / Access control / Federal Air Marshal Service / Airport security / Robert MacLean / Sensitive Security Information / Security / Transportation in the United States / Aviation security

AVIATION SECURITY ADVISORY COMMITTEE (ASAC)

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2015-02-26 10:25:05
837Security Bureau / Government / Hong Kong / Hong Kong Civil Service / Public administration / Civil service / Customs and Excise Department

LC Paper No. CB[removed]) For information Legislative Council Panel on Public Service Follow-up to meeting on 17 January 2005 Deletion of Vacant Directorate Posts

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-10-19 23:05:00
838Social information processing / Web 2.0 / Computer security / Blog hosting services / Internet privacy / Facebook / Identity theft / Social networking service / Email / Computing / Technology / Internet

Security tips for the use of social media websites

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-14 21:32:36
839Cloud storage / Cloud computing / Centralized computing / Computing

Information Security Animations – Cloud Service Case Study (Script) First Set Setting: At a Trading Company (A trading company’s staff, Ken, is opening the office’s door)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-11-23 22:00:27
840Multi-agent systems / Cyberwarfare / Botnets / Internet / Denial-of-service attacks / Zombie / Malware / Denial-of-service attack / Email spam / Computer network security / Computing / Spamming

  Information Security Animations - Zombies and Botnets (Script) What is a Zombie? Zombie computer (Zombie or Bot) is a computer connected to the Internet that has been compromised

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:54
UPDATE