Security information management

Results: 13712



#Item
501Computing / Privacy / Digital rights / Human rights / Data security / Internet privacy / Identity management / Law / Information privacy / Personal information management / Medical privacy / Email privacy

Incidental Information Privacy and PIM

Add to Reading List

Source URL: pim.ischool.washington.edu

Language: English - Date: 2011-06-27 17:58:20
502Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Domain Name System / Start menu / Installation / Control Panel

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: unbound.net

Language: English - Date: 2015-05-20 02:41:14
503Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Information technology management / Business process management / Information security / Computer security

Making Information Security a “business forward discipline” Information Security Strategy & Leadership Current State of Affairs

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-08-17 20:39:46
504Software / System software / Computing / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Start menu

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2015-05-20 02:41:14
505Security / Computer security / Identity management / Information technology management / Computer access control / Prevention / Access control / Provisioning / Business process management / User provisioning software / Aveksa

Fischer Identity™ Turn Identity Management into a Strategic Advantage Self-Service Portal

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-05-10 15:11:10
506

Password configuration process checklist (sectionAccount Management #3 & #4 March 31, 2011 The left column indicates whether the standard is listed in the Information Security Plan as a Must or Should. A justific

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2013-03-13 16:16:44
    507Computing / Data mining / Computer security / Information technology management / Anomaly detection / Data security / Intrusion detection system / Information technology / Anomaly / GridFTP / Transmission Control Protocol

    Anomaly Detection and Diagnosis in Grid Environments Lingyun Yang1 Chuang Liu2 1

    Add to Reading List

    Source URL: sc07.supercomputing.org

    Language: English - Date: 2007-10-05 15:33:58
    508

    DATA SECURITY MANAGEMENT NETWORK TECHNOLOGIES FOR INFORMATION SECURITY

    Add to Reading List

    Source URL: www.ittoday.info

    Language: English - Date: 2012-10-26 11:50:02
      509

      Information Security Training Programs The Challenge In accordance with the Federal Information Security Management Act (FISMA), a fundamental transformation in Federal Information Security (aka. Information Assurance, C

      Add to Reading List

      Source URL: www.rmf.org

      Language: English
        510Security / Prevention / Computer security / Safety / Data security / Secure communication / Computer law / Security breach notification laws / Computer security incident management / Data breach / Security information and event management / Breach

        Data Breach Response Readiness: Is Your Organization Prepared?

        Add to Reading List

        Source URL: www.huschblackwell.com

        Language: English
        UPDATE