Security information management

Results: 13712



#Item
531Concurrent computing / Information technology management / Computer security / ISO/IEC 27002 / ISO/IEC 27001 / ISO 10303 / Information security management system / Data center / Information security / Computing / Data security / Security

AMS-IX Data Centre Standard A Standard defining the minimum acceptable, and also the desirable levels, of technical implementation, resilience of operation and business continuity management for data centres providing se

Add to Reading List

Source URL: ams-ix.net

Language: English
532Data security / Computer network security / Threat / Vulnerability / Information security / Network security / Software Engineering Institute / Security information and event management / Cyber Insider Threat / Computer security / Cyberwarfare / Security

WHITE PAPER Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program. This whitepaper explores the kinds of internal users who are most

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-07-20 11:10:08
533System software / Crime prevention / National security / Password / Data security / Identity management / Information security / One-time password / Self-service password reset / Security / Computer security / Identity management systems

White Paper ENTERPRISE www.novell.com Enabling Retail Banks to

Add to Reading List

Source URL: www.tentonmarketing.com

Language: English - Date: 2014-12-17 12:32:00
534Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

Add to Reading List

Source URL: www.easycrypt.info

Language: English - Date: 2015-06-04 11:02:41
535Identity management / Identity document / Anonymity / Information privacy / Privacy / Authentication / Personally identifiable information / Electronic signature / Identity theft / Security / Ethics / Cryptography

DiagramThe identity chain

Add to Reading List

Source URL: keteninformatisering.nl

Language: English - Date: 2007-01-14 14:36:54
536Risk / Software testing / Risk management / Data security / Penetration test / Threat / Vulnerability / IT risk management / Information Technology Security Assessment / Security / Computer security / Computer network security

Complete Assessment Lifecycle

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
537Information / Electronic engineering / Precoding / MIMO / Relay channel / Channel state information / LTE Advanced / Channel / Beamforming / Information theory / Radio resource management / Telecommunications engineering

Secrecy Capacity Achieving with Physical Layer Security Approach in MIMO Two-Way Relay Channels Qiao Liu ∗† , Guang Gong† , Fellow, IEEE, Yong Wang∗ and Hui Li∗ ∗ The State Key Lab of ISN, Xidian University,

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2015-05-14 08:07:35
538Information Risk Management / Biometrics / Data management / Data security / NEC / Business continuity / Disaster recovery / Emergency management / Automated fingerprint identification / Security / National security / Business

Vol.8 AprilPublic Safety through ICT Helping cities stay safer Contents: - NEC offers city-level business continuity

Add to Reading List

Source URL: it.nec.com

Language: English - Date: 2014-12-03 05:03:22
539Information / Computer security / Information security management system / International Phonetic Alphabet / ISO/IEC 27001 / Information security management / .ipa / Information security / Copyright / Data security / Security / Data

The criteria of development site security for CC evaluations IT Security Center Information-technology Promotion Agency (IPA) Japan

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2011-09-21 17:51:00
540Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software

A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,heller

Add to Reading List

Source URL: www.gatsby.ucl.ac.uk

Language: English - Date: 2006-10-19 19:27:44
UPDATE