Security information management

Results: 13712



#Item
631Assurance services / Computer security / Information Risk Management / Information assurance

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: perceptivesoftware.com

Language: English - Date: 2015-06-18 03:54:37
632Public safety / Information security / Federal Information Security Management Act / Information assurance / Threat / Computer security / Security / Cyberwarfare

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-06-18 04:04:50
633Assurance services / Computer security / Information Risk Management / Information assurance

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-06-18 03:54:37
634Information security management system / Decentralization / Politics / Management / Government / Decision theory / Policy

AGGIS Implementation and compliance of good governance in International Sport Federations Utrecht University: Frank van Eekeren and Aline Bos

Add to Reading List

Source URL: www.playthegame.org

Language: English - Date: 2014-05-07 10:36:54
635Year of birth missing / Education / Information Systems Security Association / Issa / International Council of Sport Science and Physical Education / Abstract management / FIFA / Academic conference / Academia / Knowledge / International Review for the Sociology of Sport

International Sociology of Sport Association Association Internationale de Sociologie du Sport A Sub-Committee of ICSSPE Research Committee 27 of ISA Affiliated with UNESCO

Add to Reading List

Source URL: www.issa.otago.ac.nz

Language: English - Date: 2012-02-20 19:54:43
636Computer security / Crime prevention / National security / Information technology management / Vulnerability / Information security / Attack / Procurement / Multifunction printer / Security / Cyberwarfare / Computer network security

Vulnerability-centric assurance activities for MFP PP as a candidate for cPP Fumiaki Manabe JISEC / IPA, Japan

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-08-02 03:54:36
637Spaceflight / Global Monitoring for Environment and Security / Ethics / Geographic information systems / Emergency management / Risk / Infrastructure for Spatial Information in the European Community / Space policy of the European Union / Management / European Space Agency

GMES-Workshop_Tsvetkov-WelcomeSpeech_ENG

Add to Reading List

Source URL: www.gmes-bg.org

Language: English - Date: 2010-10-19 09:17:54
638Biometrics / Information technology management / Digital signature / Electronic signature / Signature / Enterprise content management / Authentication / Cryptography / Security / Notary

LEX_Launch_Content_Highlight_Close_CMYK

Add to Reading List

Source URL: www.perceptivesoftware.de

Language: English - Date: 2015-06-17 19:48:46
639Administration / Content management systems / Public records / Behavior / Data security / Breastfeeding / Information security / Caldicott guardian / Federal Agency for Nature Conservation / Security / Information technology management / Ethics

All correspondence to: The Breastfeeding Network PO Box 11126, Paisley PA2 8YB Tel: e-mail: www.breastfeedingnetwork.org.uk

Add to Reading List

Source URL: www.breastfeedingnetwork.org.uk

Language: English - Date: 2015-05-19 15:52:52
640Anti-communism / NATO / Partnership for Peace / Partnership for Peace Information Management System / NATO and Moldova / International relations / Military / Cold War

NATO’s Policies Towards Central Asia James Mackey Head, Office of Euro-Atlantic Integration & Partnership Political Affairs and Security Policy Division NATO Headquarters

Add to Reading List

Source URL: sverof.se

Language: English - Date: 2013-12-16 06:27:09
UPDATE