Security information management

Results: 13712



#Item
511Privacy / Identity management / Law / Internet privacy / Personally identifiable information / Medical privacy / Email / Privacy concerns with social networking services / Information privacy

PRIVACY POLICY The fact that you have trusted The Food Co-op with your personal information is very important to us, and we take multiple steps to maintain its security. We will not sell or otherwise share personally ide

Add to Reading List

Source URL: foodcoop.coop

Language: English - Date: 2014-09-10 20:49:31
512Computer network security / Cyberwarfare / Computer security / Network management / Zotob / Sasser / Antivirus software / Threat / Firewall / Computer virus

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems Presenter: Matt Harkrider Founder, Alert Logic Who We Are: Corporate Fact Sheet

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08
513

EMCOR UK. Making our customers’ lives easier EMCOR UK. Making our customers’ lives easier CONVERGENCE OF “Data Security and Management Information”

Add to Reading List

Source URL: www.workplace-futures.co.uk

Language: English - Date: 2015-02-11 06:39:42
    514

    Jelentkezési lap EOQ MNB Információbiztonsági Rendszermenedzser (ISMSM - Information Security Management System Manager)

    Add to Reading List

    Source URL: www.eoq.hu

    Language: Hungarian - Date: 2015-03-25 15:50:06
      515Computing / Information technology management / Information technology / Network management / Artificial intelligence / Autonomic networking / Information technology governance / Network performance / Virtualization / Bremen

      The International Conference on Autonomous Infrastructure Management and Security (AIMS) is a highly interactive single-track event integrating David Hausheer (University of Zurich)

      Add to Reading List

      Source URL: www.aims-conference.org

      Language: English - Date: 2008-02-07 05:15:58
      516United States government secrecy / Government / Security / National security / Secrecy / Espionage / Classified information in the United States / United States Office of Personnel Management / Security clearance / E-QIP / L clearance / Single Scope Background Investigation

      PDF Document

      Add to Reading List

      Source URL: about.clearancejobs.com

      Language: English
      517Law / Information privacy / Information technology management / Government / Identity management / Privacy / Personal Information Protection and Electronic Documents Act / Internet privacy / Information security / Medical privacy

      PDF Document

      Add to Reading List

      Source URL: www.kiecan.com

      Language: English - Date: 2007-06-26 16:01:18
      518Network management / System administration / Internet Standards / Internet protocols / Syslog / Balabit / Log management / Security information and event management / Rsyslog

      PDF Document

      Add to Reading List

      Source URL: pages.balabit.com

      Language: English - Date: 2016-02-08 21:07:03
      519

      STRUCTURED SYSTEMS ECONOMICS FOR SECURITY MANAGEMENT ADAM BEAUTEMENT AND DAVID PYM A BSTRACT. We develop an ontological account of information security architectures that is inspired by economic models of trade-offs betw

      Add to Reading List

      Source URL: weis2010.econinfosec.org

      Language: English
        520

        Seccuris, an international information assurance company headquartered in Canada, provides clients with security and risk management consulting services, managed security services, security solution integration, and educ

        Add to Reading List

        Source URL: www.seccuris.com

        Language: English
          UPDATE