Security information management

Results: 13712



#Item
601

Space-based information for enhanced risk management, food security and resilience World Food Programme Office for Climate Change, Environment and Disaster Risk Reduction

Add to Reading List

Source URL: www.uncosa.unvienna.org

Language: English - Date: 2012-03-20 05:51:16
    602

    IFAFI NEIGHBOURHOOD WATCH SECURITY MANAGEMENT PLANAPPENDIX G: HANDLING OF INTELLIGENCE/INFORMATION IFAFI NEIGHBOURHOOD WATCH/ IFAFI BUURTWAG

    Add to Reading List

    Source URL: files.groupspaces.com

    Language: English
      603Crime prevention / National security / Transport / Indian Railways / Rail transport in India / Information security management system / Security policy / Computer security / John N. Warfield / Security / Government / Data security

      Transport Research Arena 2014, Paris Interpretive structural modelling of security system for better security management in railways Anoop Srivastavaᵃ, Sanjeev Swamiᵇ, Devender Banwetᵃ,ᵇ,c,*

      Add to Reading List

      Source URL: tra2014.traconference.eu

      Language: English - Date: 2015-01-12 10:33:56
      604Actuarial science / Auditing / Risk management / Risk / Information security / Corporate governance / Security management / Internal control / Emergency management / Management / Public safety / Security

      141030_0935_ishikawa Board of Directors, Corporate Officers and Corporate Auditors Corporate Governance Framework for Risk Management

      Add to Reading List

      Source URL: www.nippon-shinyaku.co.jp

      Language: English - Date: 2014-11-10 02:33:52
      605Information theory / Radio electronics / IEEE 802 / MIMO / Antenna / Electronics / Electronic countermeasures / Antenna diversity / Radio resource management / Telecommunications engineering / Electronic engineering

      2013 IEEE Symposium on Security and Privacy On Limitations of Friendly Jamming for Confidentiality Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun Institute of Information Security ETH Zurich

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-04-05 19:56:18
      606Computer security / Risk management / Data security / Actuarial science / Risk / Information Technology Security Assessment / COCIR / Information security / Emergency management / Management / Security / Medicine

      Microsoft Word - Information Security Risk Management for Healthcare Systems.doc

      Add to Reading List

      Source URL: www.medicalimaging.org

      Language: English - Date: 2014-06-12 12:27:58
      607Project management / Risk / Risk management / Business / Prevention / Information security / Security / Computer security / Management

      Data Protection Act 1998 Undertaking follow-up OFFICE Holdings Ltd (“OFFICE”) ICO Reference: COM0542736 On 23 April 2015 the Information Commissioner’s Office (ICO) conducted

      Add to Reading List

      Source URL: ico.org.uk

      Language: English - Date: 2015-04-23 10:43:32
      608Data security / Information Risk Management / Risk analysis / Espionage / Computing / SAS / Hardware security module / Classified information / Asset / Security / UICC / Computer security

      FSG.04 Security Accreditation Scheme for UICC Production - Standard v0.1 (Current)

      Add to Reading List

      Source URL: www.gsma.com

      Language: English - Date: 2015-05-11 10:46:08
      609Security / Data management / Risk analysis / Data erasure / Information security / Asset management / Threat / Data loss / Vulnerability / Computing / Computer security / Data security

      APRIL 2012 • ISSUE 1 IT ASSET DISPOSAL • RISK MANAGEMENT • COMPLIANCE • IT SECURITY • DATA PROTECTION Exploring the challenge of erasing

      Add to Reading List

      Source URL: www.adisa.org.uk

      Language: English - Date: 2013-02-11 14:56:56
      610Internet / Privacy / Identity management / Personal life / Personally identifiable information / HTTP cookie / Email / In re Gateway Learning Corp. / Privacy Office of the U.S. Department of Homeland Security / Ethics / Computing / Internet privacy

      Privacy Policy Last Modified: April 3, 2015 1

      Add to Reading List

      Source URL: amandakimball.jamberrynails.net

      Language: English - Date: 2015-06-10 15:35:03
      UPDATE