Security information management

Results: 13712



#Item
571Computer security / Crime prevention / Information security / National security / Certified Information Systems Auditor / Enterprise resource planning / Identity management / Neoris / ResNet / Data security / Security / Business

Lowell BallardWheaton, Illinois linkedin.com/in/lowellballard

Add to Reading List

Source URL: www.bradley.edu

Language: English - Date: 2015-03-30 17:42:16
572United States federal executive departments / Military science / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Insider / National security

GAO, INSIDER THREATS: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-06-02 15:11:33
573Administration / Content management systems / Information technology management / Public records / Ethics / Email archiving / Information security / Records management / Freedom of information legislation / Email / Computing / Security

University of Lincoln Record Retention and Disposal Policy Version 1, November 2011 Document Summary

Add to Reading List

Source URL: secretariat.blogs.lincoln.ac.uk

Language: English - Date: 2014-04-02 09:13:50
574Taxation in the United States / Turnover / Employment / Human resource management / Social Security

Extracting Firm Information from Administrative Records: The ASSD Firm Panel∗ Martina Fink†, Esther Kalkbrenner‡, Andrea Weber§, Christine Zulehner¶ April 26, 2010 Abstract

Add to Reading List

Source URL: weber.vwl.uni-mannheim.de

Language: English - Date: 2010-04-27 04:17:06
575Actuarial science / Data security / Crime prevention / Management / Porgera Gold Mine / Security management / Security guard / Information security management system / Corporate social responsibility / Security / Ethics / Public safety

B ARRICK G OLD C ORPORATION Annual Report on Barrick’s Voluntary Principles on Security and Human Rights Program

Add to Reading List

Source URL: www.voluntaryprinciples.org

Language: English - Date: 2015-04-13 13:07:13
576Computing / Data security / Storage efficiency / Backup / Database / Data compression / Daewoo Precision Industries K2 / RAID / Record linkage / Information / Data management / Data

reduction capacity storage benefits

Add to Reading List

Source URL: kaminario.com

Language: English - Date: 2014-09-30 15:13:17
577Identity management systems / Computing / Identity management / Security Assertion Markup Language / Shibboleth / Copyright / Public key certificate / Internet privacy / Data / Federated identity / Information

Australian Access Federation For Research and Higher Education Identifying Researchers Presented at APSR Workshop, National Library of Australia 3 June 2008

Add to Reading List

Source URL: apsr.anu.edu.au

Language: English - Date: 2008-06-03 21:45:09
578Human resource management / Taxation in the United States / Social Security / Sick leave / Employee benefit / Temporary work / Full-time / Permatemp / Disability insurance / Employment / Employment compensation / Employment classifications

THE UNIVERSITY OF TENNESSEE Faculty and Staff Benefits Select any BENEFIT for more information. BENEFIT

Add to Reading List

Source URL: humanresources.tennessee.edu

Language: English - Date: 2015-06-22 12:47:00
579Local area networks / PacketFence / Information technology management / Virtual LAN / Universal Serial Bus / Network-to-network interface / Dynamic Host Configuration Protocol / Network management / Computer network security / Computing

Anyfi�Quick�Installation�Guide for�PacketFence�version�5.0.0 Anyfi�Quick�Installation�Guide by�Inverse�Inc.

Add to Reading List

Source URL: www.packetfence.org

Language: English - Date: 2015-04-16 09:14:37
580Privacy law / Data security / Law / Security controls / Security management / Information technology management / Computer security / Data privacy / Health Insurance Portability and Accountability Act

HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference Safeguard (Standard)

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
UPDATE