Security information management

Results: 13712



#Item
551Business / Risk / Security / Innovation / Political risk / Information Services Procurement Library / Technological innovation system / International Risk Governance Council / Management / Actuarial science / Ethics

Paper to be presented at the DRUID 2011 on INNOVATION, STRATEGY, and STRUCTURE Organizations, Institutions, Systems and Regions at Copenhagen Business School, Denmark, June 15-17, 2011

Add to Reading List

Source URL: druid8.sit.aau.dk

Language: English - Date: 2011-06-18 04:58:27
552Software development / Information technology audit / COBIT / Privacy / Standards / Corporate governance of information technology / Information security management system / Information Criteria / Capability Maturity Model / Information technology management / Information technology governance / Project management

Microsoft Word - asist124-camera.docx

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:54:36
553National security / Espionage / Information Security Oversight Office / National Archives and Records Administration / United States Office of Personnel Management / Security clearance / Computer security / United States Department of Homeland Security / OPM / Government / United States government secrecy / Security

ISOO Notice: Message from OPM to Security Clearance Holders June 16, 2015 ISOO provides the following message from OPM to security clearance holders:

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2015-06-17 15:22:00
554Public safety / Computer security / Actuarial science / Risk management / Business continuity / Information security management system / Information security / Emergency management / Risk assessment / Management / Security / Data security

Microsoft PowerPoint - ENISA FORTH Summer School Business Continuity Presentation v1.0.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:07
555National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Security controls / Information security / Federal Information Processing Standard / Committee on National Security Systems / Computer security / Security / Data security

Microsoft Wordrev3-final-cleanerrata.docx

Add to Reading List

Source URL: www.cloudcontrols.org

Language: English - Date: 2011-06-03 05:36:08
556Emergency management / Safety / 9-1-1 / Emergency / In case of emergency / Emergency evacuation / Public safety / Management / Security

Evacuation Assistance Form For Persons Requesting Additional Assistance Once all information has been entered completely, please send form by campus mail, U.S.P.S., in person or submitted electronically to: utpdrecords@u

Add to Reading List

Source URL: utpolice.utk.edu

Language: English - Date: 2015-03-01 12:59:28
557Royal Botanic Garden Edinburgh / Scottish Government Enterprise and Environment Directorate / Scotland / Content management systems / Executive agencies of the Scottish Government / Records management / National Archives of Scotland / Keeper of the Records / Information security / Edinburgh / Inventory of Gardens and Designed Landscapes / Business

Assessment Report

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2014-09-10 09:38:47
558Computer printers / Information technology management / Media technology / Multifunction printer / Konica Minolta / Computer network security / Password / Printer / Network security / Office equipment / Technology / Computing

Closeup of Combination Safe Lock

Add to Reading List

Source URL: www.konicaminolta.pt

Language: English - Date: 2012-08-23 06:45:07
559Business process management / Information technology management / Operational intelligence / Predictive analytics / Malware / SCADA / Computer security / Technology / Business / Security

Cyber and Operational Solutions for a Connected Industrial Era OPERATIONAL & SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLD In face of increasing operational challenges and cyber threats, and their growing sc

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 20:03:14
560System software / Cyberwarfare / Network management / Netflow / IP Flow Information Export / Wireless networking / Traffic flow / Pcap / Packet analyzer / Computing / Computer network security / Software

Microsoft PowerPoint - mnet_07_Measurements

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-12-17 04:04:23
UPDATE