Security information management

Results: 13712



#Item
471

Information Security Management System ISMS適合性評価制度説明会 ISO/IEC 27001とISMS認証基準 との比較分析の概要

Add to Reading List

Source URL: www.isms.jipdec.or.jp

Language: Japanese - Date: 2005-12-28 00:46:06
    472Government / Education / Science and technology / Small Business Administration / Small Business Innovation Research / Science /  technology /  engineering /  and mathematics / Office of Scientific and Technical Information / Office of Management and Budget / United States Department of Homeland Security / America COMPETES Act / Joint Ocean Commission Initiative

    July 9, 2015 MOF EXECUTIVE DEPARTMENTS AND AGENCIES

    Add to Reading List

    Source URL: www.whitehouse.gov

    Language: English - Date: 2015-07-09 19:42:49
    473Digital rights / Human rights / Privacy / Identity management / Right to privacy / Soldal v. Cook County / Internet privacy / Information privacy / Personally identifiable information / Legal aspects of computing / International Association of Privacy Professionals / Expectation of privacy

    INFORMATION SECURITY & PRIVACY NEWS PAGE 7 INFORMATION SECURITY NEWS A Publication of the Information Security Committee

    Add to Reading List

    Source URL: www.cnri.reston.va.us

    Language: English - Date: 2015-09-09 08:24:55
    474Economy / Business / Security / Automatic identification and data capture / Supply chain management / Computer security / Access control / Logistics / Radio-frequency identification / Track and trace

    Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains

    Add to Reading List

    Source URL: cocoa.ethz.ch

    Language: English - Date: 2013-05-23 02:09:57
    475Computing / Data management / Security / Data / E-commerce / Big data / Technology forecasting / Transaction processing / Internet privacy / Privacy / Elisa Bertino / Data security

    Department of Computer Science Information Security and Database Systems from Medicine to Humanities Elisa Bertino CS Department, Cyber Center, and CERIAS

    Add to Reading List

    Source URL: www.issnaf.org

    Language: English - Date: 2015-02-27 15:56:50
    476Computing / Network architecture / Computer network security / Information technology management / Configuration management / Software-defined networking / OpenFlow / Controller / Stateful firewall / Open vSwitch / Firewall / Control theory

    HotSwap: Correct and Efficient Controller Upgrades for Software-Defined Networks Laurent Vanbever Joshua Reich

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2013-06-13 09:26:16
    477Security / Prevention / Computer security / Safety / Data security / Cryptography / National security / Information security / Security controls / Access control / Password / ISO/IEC 27001:2005

    Apollo Education Group Information Security Asset Management Responsibility and Acceptable Use Standards Document

    Add to Reading List

    Source URL: www.apollo.edu

    Language: English - Date: 2016-02-19 07:01:47
    478Security / Prevention / Computer security / Computer network security / Data security / Cryptography / Information security / Threat / Managed security service / Risk management / Asset / Vulnerability

    In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

    Add to Reading List

    Source URL: www.nttcomsecurity.com

    Language: English - Date: 2015-07-14 05:58:47
    479Data management / Computing / Data / Security / Internet privacy / Privacy / Computer security / Big data / Data lineage

    INFORMATION  SECURITY  AND  DATABASE  SYSTEMS     FROM  MEDICINE  TO  HUMANITIES   Elisa  Bertino,  Director  CERIAS,  Purdue  University     Recent   technological

    Add to Reading List

    Source URL: www.issnaf.org

    Language: English - Date: 2015-04-08 18:51:42
    480Prevention / Security / Safety / Computer security / National security / Actuarial science / Cryptography / Information security / Risk management / Threat / Risk / Nippon Telegraph and Telephone

    Corporate Overview Why organisations trust NTT Com Security Who we are We’re a globally respected information

    Add to Reading List

    Source URL: www.nttcomsecurity.com

    Language: English - Date: 2015-07-21 04:25:37
    UPDATE