Security Management

Results: 59084



#Item
221Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Online Certificate Status Protocol / Certificate authority / Public key certificate / Revocation list / Heartbleed / HTTPS

Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:43
222Computing / Telecommunications engineering / Data management / Fibre Channel / Internet Fibre Channel Protocol / ISCSI / Storage area network / XAM / Backup / Storage security / Software-defined storage

STORAGE NETWORKING CONCEPTS FOUNDATION Building a Working Knowledge of Storage Networking through a clear understanding of Solutions & Technology For professionals who require a comprehensive

Add to Reading List

Source URL: www.snia-sa.org

Language: English - Date: 2010-10-20 15:16:22
223Academia / Swisscontact / Economy / Private sector development / Performance measurement / United States Agency for International Development / International development / Aid / Innovation / Food security / The SEEP Network / Business process management

CV A Miehlbradt October 2014

Add to Reading List

Source URL: www.enterprise-development.org

Language: English - Date: 2016-04-27 04:09:36
224Emergency management / Safety / 9-1-1 / Federal Communications Commission / Fire alarm system / Emergency / Prevention / Euthenics / Security

EMERGENCY RESPONSE PLANS – Missouri S&T REPORT ALL EMERGENCIES TO UNIVERSITY POLICE DIAL 911 ALWAYS BE PREPARED TO FOLLOW PROCEDURES IN CASE OF AN EMERGENCY

Add to Reading List

Source URL: ems.mst.edu

Language: English - Date: 2014-01-22 04:22:25
225Economy / Business / Supply chain management / Security / Logistics / International trade / Packaging / Cargo / Security seal / Intermodal container / Containerization / Customs-Trade Partnership Against Terrorism

Boeing Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria for International Suppliers/Shippers

Add to Reading List

Source URL: www.boeingsuppliers.com

Language: English - Date: 2009-11-06 12:53:55
226Computer access control / Security / Computer security / Access control / Identity management / Security token / Authorization / Authentication / Access token / Electronic authentication

Ubiquitous Internet Access Control: The PAPI System Trustbus02 – Aix-en-Provence, September 2002

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
227Computer access control / Computer security / Identity management / Identity / Federated identity / Security Assertion Markup Language / Authentication / Identity provider / Best practice / Identity assurance

30-NovMilestone MNA3.1: Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:15
228Computing / Computer network security / Computer security / Data security / Cyberwarfare / Firewall / Network management / Software / Transmission Control Protocol / Stateful firewall / Network address translation

Managed Security Service – Change Request Form (to be completed by customer) Explanation Notes: ALL sections must be completed and an authorizing Signature included on the SR Cover Application Form. 1-Net cannot

Add to Reading List

Source URL: 1-net.com.sg

Language: English - Date: 2015-12-30 21:07:38
229Government / Human rights / Security / Law / Identity management / Privacy / Information privacy / International Safe Harbor Privacy Principles / Telecommunications data retention

Proposed United States–United Kingdom Agreement on Secure and PrivacyProtective Exchange of Electronic Data for the Purposes of Countering Serious Crime, Including Terrorism Summary The Administration has been discussi

Add to Reading List

Source URL: www.netcaucus.org

Language: English - Date: 2016-07-22 18:36:18
230Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: nextlog.it

Language: English - Date: 2014-05-07 13:40:47
UPDATE