Security Management

Results: 59084



#Item
381Information technology management / Corporate Governance of ICT / Evaluation / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

Organizational Unit National ICT Governance (NIG) - Program Monitoring, Evaluation and Statistical Coordination Division (PMESC) Functions of the Division Position

Add to Reading List

Source URL: dict.gov.ph

Language: English - Date: 2014-12-01 02:05:56
382Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Public key certificate / Certificate authority / Revocation list / Online Certificate Status Protocol / Root certificate / KPN / Certification Practice Statement

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2016-06-28 10:00:02
383General Services Administration / Government procurement in the United States / Electronic signature / Paperless office / Cryptography / Security / Government / GSA Advantage / Federal Systems Integration and Management Center

e-SignLive-logo-screen

Add to Reading List

Source URL: www.esignlive.com

Language: English - Date: 2016-01-26 06:04:54
384Computing / Security / Cryptography / Cloud computing / Information technology management / Crime prevention / National security / Digital transaction management / XDTM Standard Association / Records management / Computer security / ARX

The xDTM Standard The Transaction Management Standard for an Open Digital World Executive Brief The xDTM Standard

Add to Reading List

Source URL: www.xdtm.org

Language: English - Date: 2016-06-28 14:48:03
385Economy / Actuarial science / Auditing / Risk / Financial risk / Security / Risk management / Operational risk / Internal audit / Minimum capital requirement / Systemic risk / Basel II

Nikko Asset Management Europe Ltd FCA Reference Number: Capital Requirements Directive Pillar 3 Disclosure

Add to Reading List

Source URL: www.nikkoam.co.uk

Language: English - Date: 2016-06-20 04:22:06
386Economy / Business / Employment / Human resource management / United States labor law / Labour relations / At-will employment / Recommendation letter / Dismissal / Labour law / Social Security

Microsoft Word - Ovations Employment Applicationdoc

Add to Reading List

Source URL: www.roadiesrestaurant.com

Language: English - Date: 2016-02-05 11:26:18
387Computing / Security / Linear Tape-Open / Information science / Data management / Backup / Data security / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

Security » Easily stored offline to protect against on-line data corruption » Easily stored offsite in case of a disaster recovery situation » Hardware based data encryption for added data security » WORM cartrid

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:24:42
388Computing / Internet privacy / Internet / Computer security / Privacy / Identity management / Internet security / Human rights / Tor / Information privacy / Google Public DNS / HTTP cookie

DE GRUYTER OLDENBOURG it – Information Technology 2015; Galley Proof Self-Portrayals of GI Junior Fellows Dominik Herrmann*

Add to Reading List

Source URL: junior-fellows.gi.de

Language: English - Date: 2016-03-23 12:56:37
389Nuclear strategies / Military doctrines / Military science / Nuclear warfare / International security / Nuclear triad / Management / Mutual assured destruction / Single Integrated Operational Plan / Pre-emptive nuclear strike

Capabilities-based Planning: Application to Strategic Force Planning

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:44
390Digital rights / Human rights / Data security / Identity management / Law / Privacy / Information privacy / Internet privacy / Right to privacy / Medical privacy / Digital media / Internet activism

“Control of Personal Information: A Dialogue Between a Technologist and a Lawyer” Radcliffe Inst. and Harvard Div. of E&AS Symposium on Security and Privacy April 23, 2004

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2004-05-07 13:54:31
UPDATE