Security information management

Results: 13712



#Item
541Identity management / OpenID / Information / Computer security / Computing / Identifiers / Identity / Federated identity / Metadata

Persistent Identifier Demonstration

Add to Reading List

Source URL: apsr.anu.edu.au

Language: English - Date: 2008-06-03 21:45:09
542United States Department of Homeland Security / European Programme for Critical Infrastructure Protection / Critical infrastructure protection / Critical infrastructure / Directorate-General for Information Society and Media / Emergency management / National security / Infrastructure / Security engineering

PDF Document

Add to Reading List

Source URL: www.cockpitci.eu

Language: English - Date: 2014-03-25 07:46:04
543

GOVERNOR First Vice Governor Information Security Management Committee

Add to Reading List

Source URL: www.bdl.gov.lb

Language: English - Date: 2012-12-06 07:04:18
    544Information technology management / Document management system / Information security / Public safety / Computing / Computer security / Security / Data loss prevention software

    Integration with Data Loss Prevention (DLP) Controlled Document Collaboration with DLP Remediation and Discovery

    Add to Reading List

    Source URL: info.watchdox.com

    Language: English - Date: 2015-07-18 21:16:44
    545Storage Networking Industry Association / XAM / Computer data storage / Backup / ISCSI / Information security / Best current practice / Mark Carlson / Storage Management Initiative – Specification / Computing / Data security / Security

    Storage Security Best Current Practices (BCPs) VersionPublication of this SNIA Technical Proposal has been approved by the SNIA. This document represents a stable proposal for use as agreed upon by the Security TW

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2009-06-24 18:34:10
    546Open data / Computing / Intellectual property law / Global Monitoring for Environment and Security / Data center / Data.gov.uk / Geographic information system / Copyright / Open access / Data management / Information / Data

    Management of Intellectual Property of Data Resources “Gate-keeping” vs. “Open Door” Martin Juckes, October 2014 Table of Contents 1 Introduction...................................................................

    Add to Reading List

    Source URL: www.clipc.eu

    Language: English - Date: 2015-05-19 10:55:15
    547Centralized computing / Computer law / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Security information and event management / Integrated Cloud Service Management / Novell Cloud Security Service / Computer security / Computing / Cloud computing

    CloudLock for ServiceNow The Cloud Security Fabric for ServiceNow & Other Cloud Apps CloudLock provides a cloud security fabric that protects your corporate assets while enabling secure cloud storage, sharing and collabo

    Add to Reading List

    Source URL: www.cloudlock.com

    Language: English - Date: 2015-07-01 10:00:43
    548Data security / Computer security / Risk management / Actuarial science / Mehari / Information security management system / ISO/IEC 27005 / Information security / Vulnerability / Management / Security / Risk

    CLUSIFCLUSIR-Est-Mehari-2010-En

    Add to Reading List

    Source URL: www.clusif.fr

    Language: English - Date: 2011-08-19 06:11:43
    549Information technology management / Computing / Anomaly detection / Data security / Scalability / Neural network / Statistics / Computational neuroscience / Data mining

    Simularity Brings Real Time Deep Learning To The Edges Of The Internet Of Things Deep Learning For The Connected World Predict events and detect anomalies in real time, using deep distributed learning, on massive time s

    Add to Reading List

    Source URL: simularity.com

    Language: English - Date: 2015-03-20 01:37:38
    550Management / Data security / Actuarial science / Risk management / Vulnerability / Information security / Threat / Security controls / Financial risk / Security / Computer security / Risk

    Risk management, concepts and methods

    Add to Reading List

    Source URL: www.clusif.fr

    Language: English - Date: 2009-02-02 05:21:42
    UPDATE