Security information management

Results: 13712



#Item
451Computer access control / Identity management / Computer security / Computing / Federated identity / SOA Security / Security Assertion Markup Language / WS-Security / Single sign-on / Identity management system / Service-oriented architecture / Information Card

Dynamic Business Service Networks using Virtual Organisations

Add to Reading List

Source URL: www.crosschecknet.com

Language: English - Date: 2010-01-11 16:40:17
452Computing / Internet / Software / Internet Standards / Internet protocols / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Unbound / Installation / Start menu

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, October 2010 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: www.unbound.net

Language: English - Date: 2010-11-08 06:57:17
453Crime prevention / Cryptography / Information governance / National security / Data security / BSI Group / Information security / Professional certification / Computer security

BSI Case Study Fredrickson InternationalInformation Security Management How Fredrickson has reduced third party scrutiny and protected its reputation with ISOcertification.

Add to Reading List

Source URL: www.bsigroup.com

Language: English - Date: 2014-04-22 09:58:06
454Emergency management / Government / United States Department of Homeland Security / Disaster preparedness / Humanitarian aid / Occupational safety and health / Federal Emergency Management Agency / HSEEP / Homeland security / Research and Innovative Technology Administration / Virginia Secretary of Public Safety

  UTC Project Information Project Title Exercise Handbook: What Transportation Security and

Add to Reading List

Source URL: transweb.sjsu.edu

Language: English - Date: 2016-02-01 14:33:59
455Privacy / Economy / Business law / Human rights / Identity management / E-commerce / Law / Data security / Internet privacy / Information privacy / Medical privacy / Consumer privacy

Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper) Joan Feigenbaum1 , Michael J. Freedman2 , Tomas Sander3 , Adam Shostack4 1

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:42:01
456

Information Security Management System ISMS適合性評価制度の 移行計画等の概要 財団法人 日本情報処理開発協会 情報セキュリティ部 ISMS制度推進室

Add to Reading List

Source URL: www.isms.jipdec.or.jp

Language: Japanese - Date: 2005-12-28 01:04:24
    457Software / World Wide Web / User interface techniques / Computing / Internet marketing / Information technology management / Pop-up ad / Point and click / Safari / Landing page

    Get Rate Guide 1. Go to www.hsbc.co.id. 2. Login to Business Internet Banking. 3. Fill in the required data in the Security Logon Page.

    Add to Reading List

    Source URL: www.hsbc.co.id

    Language: English - Date: 2010-11-26 03:35:05
    458Prevention / Security / Safety / Crime prevention / Cryptography / Information governance / National security / Password / Information security / Authorization / Computer security / Identity management

    Microsoft Word - NetIDAccesstoUniversityITResources.docx

    Add to Reading List

    Source URL: policy.nd.edu

    Language: English - Date: 2015-05-22 10:05:47
    459

    Information Security Management Systems Accreditation Criteria and Guidance for ISMS Certification Bodies JIP-ISAC100E-2.2

    Add to Reading List

    Source URL: www.isms.jipdec.or.jp

    Language: English - Date: 2011-10-28 01:31:23
      460Health / Medicine / Health informatics / EHNAC / Quality assurance / Health Insurance Portability and Accountability Act / Accreditation / Health information exchange / Medical billing / Electronic prescribing / Health information management / CAQH

      FOR IMMEDIATE RELEASE Navicure Achieves EHNAC Healthcare Network Accreditation HNAP accreditation ensures adherence to health data processing standards and compliance with security infrastructure and integrity requiremen

      Add to Reading List

      Source URL: www.navicure.com

      Language: English - Date: 2015-08-07 13:19:11
      UPDATE