Security information management

Results: 13712



#Item
171Information technology management / Computing / Computer security / Data mining / Data security / Information technology / Anomaly detection / Data analysis / Intrusion detection system / Network monitoring / Anomaly / Server

Anomaly detection from server log data. A case study

Add to Reading List

Source URL: www.vtt.fi

Language: English - Date: 2015-03-18 09:57:49
172Government procurement in the United States / Business / Government / Professional studies / General Services Administration / Federal Information Security Management Act / Procurement / Contracting Officer / Purchasing / Federal Acquisition Regulation / PRISM / Federal procurement data system

Procurement Service Line Service Descriptions Overview/Summary of Services//ARC ARC Procurement provides a full range of procurement services including procurement system platform, simplified acquisition, contract, contr

Add to Reading List

Source URL: arc.publicdebt.treas.gov

Language: English - Date: 2016-05-06 08:37:00
173Internet privacy / Privacy / Computing / Identity management / Computer security / Privacy policy / HTTP cookie / Personally identifiable information / Digital media / In re Gateway Learning Corp. / P3P

Comics Studies Society (CSS) Privacy Statement and Return/Refund Policy Privacy Policy Comics Studies Society (CSS) ("us", "we", or "our") operates http://www.comicssociety.org (the "Site"). CSS is committed to protectin

Add to Reading List

Source URL: www.comicssociety.org

Language: English - Date: 2016-02-07 21:47:27
174Privacy / Data security / Data protection / Law / Identity management / Information privacy / Computing / Internet privacy / Medical privacy / Personally identifiable information / Data Protection Act / Privacy law

ASTRAZENECA GLOBAL POLICY DATA PRIVACY This Global Policy sets out the requirements for ensuring that we collect, use, retain and disclose personal data in a fair,

Add to Reading List

Source URL: www.astrazeneca.com

Language: English - Date: 2016-01-07 10:05:06
175Computer security / Prevention / Security / Data security / IT risk management / Management / Federal Information Security Management Act / Risk management / Vulnerability / Information security / Business continuity / Security controls

U.S. CONSUMER PRODUCT SAFTEY COMMISSION OFFICE OF INSPECTOR GENERAL FY 2015 FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW REPORT

Add to Reading List

Source URL: www.cpsc.gov

Language: English
176Identity management / Computer security / Computing / Data security / Federated identity / Meeco / Privacy / Personal /  Inc. / Internet privacy / Digital identity / Information technology management

PRESS RELEASE Meeco is winner of the IDentity Innovation award 2016. 15 June 2016, Meeco wins the identity innovation award 2016. The price for the

Add to Reading List

Source URL: www.idnext.eu

Language: English - Date: 2016-06-19 14:56:49
177Computer security / Security / Prevention / Data security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Controlled Unclassified Information / NIST Cybersecurity Framework / Regulatory compliance / Information security

An Introduction to NIST Special Publicationfor Higher Education Institutions

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-18 11:38:08
178Computing / Software / Security / Identity management / Law / Privacy / Internet privacy / Ubiquitous computing / Usability / Information privacy / Ambient intelligence / Medical privacy

A Usability Evaluation of a Home Monitoring System Rajah James Aleecia M. McDonald Robert McGuire

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
179Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Software project management / Computer security / Abuse case / Vulnerability / Andreas Lothe Opdahl

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: , Volume 3, Issue 2, March – April 2014 ISSNMea

Add to Reading List

Source URL: www.ijettcs.org

Language: English - Date: 2014-05-13 04:33:09
180Computing / Security / Cryptography / Data security / Information governance / Computer network security / Key management / Computer security / Apache Accumulo / Cloud computing security

Transitions A ROUNDUP OF LINCOLN LABORATORY TECHNOLOGY TRANSFER OPPORTUNITIES IN CYBER SECURITY Technology Transfer

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:25:15
UPDATE