Security and Maintenance

Results: 615



#Item
11Civil engineering / Geodesy / Optical devices / Surveying / Tablet computer / Total station / Topcon / Bluetooth / Touchscreen

OS Series On-board Total Stations • Advanced Security and Maintenance with New TSshield™

Add to Reading List

Source URL: www.topconpositioning.eu

Language: English
12Data security / Privacy / Identity documents / Identity management / Personal life / Personally identifiable information / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Email / Information security

KEY PRIVACY LAWS AND OTHER GUIDANCE The Department of Commerce adheres to federal privacy laws and guidance to ensure that the collection, use, and maintenance of sensitive information,

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-11-23 16:00:03
13University governance / Central Valley / Davis /  California / University of California /  Davis / Chancellor / Provost / Penal Code / Consent

UC Davis Policy and Procedure Manual Chapter 390, Emergency Management and Campus Security Section 20, Maintenance of Order Date: Supersedes: Responsible Department: Offices of the Chancellor and Provost

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2012-09-14 18:06:04
14Atomic tourism / Bechtel / Savannah River Site / Nuclear history of the United States / Maintenance / Savannah River National Laboratory / Savannah /  Georgia / Nuclear safety and security / Savannah / Tritium / Fluor Corporation / Preventive maintenance

Principal Media Contact: Angeline French Savannah River Nuclear Solutions, LLCDOE Media Contact: Amy Boyette

Add to Reading List

Source URL: www.srs.gov

Language: English - Date: 2015-08-18 15:40:30
15Antivirus software / Rogue software / Freeware / Scareware / Identity theft / Spyware / AVG AntiVirus / Malwarebytes / Malware / Security and Maintenance / Computer virus / Ad-Aware

How to Protect Your Computer from Malware A free guide from Ducktoes Computer Services of Calgary, Alberta Many computers I see in my virus lab have little or no protection against

Add to Reading List

Source URL: www.ducktoes.com

Language: English - Date: 2016-06-29 23:58:31
16Data security / Privacy / Identity documents / Identity management / Personal life / Personally identifiable information / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Email / Information security

KEY PRIVACY LAWS AND OTHER GUIDANCE The Department of Commerce adheres to federal privacy laws and guidance to ensure that the collection, use, and maintenance of sensitive information,

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2015-11-23 16:00:03
17Prevention / Customer experience management / Safety / Availability / Help desk / Surveillance / Security

SYSTEM ASSURANCE SERVICES ERA supplies systems and products which were developed to be always on-line, always available. The system design by ERA allows for a minimal and unobtrusive maintenance schedule. To assure all o

Add to Reading List

Source URL: www.era.aero

Language: English - Date: 2016-06-06 11:28:52
18

PROJECT MANAGEMENT & SERVICE AND MAINTENANCE TAKE THE GUESSWORK OUT OF SECURITY. Our national team of engineers and technicians have the network expertise

Add to Reading List

Source URL: www.dieboldindia.com

Language: English - Date: 2008-05-02 03:52:20
    19Information technology management / Information technology / Management / Computing / Systems engineering / Method engineering / IEEE standards / Security / Change management / ITIL / Business requirements / Software maintenance

    Microsoft Word - Sample IT Change Management Policies and Procedures Guide.doc

    Add to Reading List

    Source URL: it.mst.edu

    Language: English - Date: 2016-05-16 11:34:55
    20Privacy / Data security / Identity documents / Internet privacy / Personally identifiable information / Computing / Gmail / Medical privacy / Government / Structure

    Privacy Policy Table of Contents 1. Purpose of Collection and Use of Personal Information 2. Range of Personal Information 3. Maintenance and Disuse of Personal Information 4. Range of Cookie Use

    Add to Reading List

    Source URL: icap2016.org

    Language: English - Date: 2016-03-14 20:28:10
    UPDATE