Security information management

Results: 13712



#Item
641Internet / Privacy / Identity management / Personal life / Personally identifiable information / HTTP cookie / Email / In re Gateway Learning Corp. / Privacy Office of the U.S. Department of Homeland Security / Ethics / Computing / Internet privacy

Privacy Policy Last Modified: April 3, 2015 1

Add to Reading List

Source URL: www.staceyhenderson.jamberrynails.net

Language: English - Date: 2015-06-10 15:35:03
642United States Department of Homeland Security / Government / Citizenship in the United States / Conscription in the United States / United States / Public safety / Immigration to the United States / United States Citizenship and Immigration Services / Government Accountability Office

GAO-07-1013R USCIS Transformation: Improvements to Performance, Human Capital, Communications, and Information Technology Management Needed as Modernization Proceeds

Add to Reading List

Source URL: www.ancir.org

Language: English - Date: 2007-08-22 21:57:06
643Usability / Technology / Audit / Systems engineering process / Data security / Business / IT risk management / Defence Science and Technology Agency / Information technology management / Human–computer interaction / Technical communication

Microsoft Word - NPOKI Consuting Services_11_Final _2_.doc

Add to Reading List

Source URL: www.npoki.org

Language: English - Date: 2009-12-21 17:56:42
644Business continuity / BS 25999 / Security / Recovery time objective / Information Technology Infrastructure Library / Risk management / Management / Emergency management / Business

University of Glasgow Policy for Business Continuity Management

Add to Reading List

Source URL: www.gla.ac.uk

Language: English - Date: 2015-02-04 08:34:23
645Electronic engineering / Mobile telecommunications / Logical Link Control / SMS / Wireless modem / Subscriber identity module / Hayes command set / Mobile phone / Information security management system / Technology / Mobile technology / Modems

SMSFinder User Guide for SF100, SF400, SF800 models

Add to Reading List

Source URL: downloads.inlogic.dk

Language: English - Date: 2013-02-21 03:40:56
646Actuarial science / Risk management / Financial risk / Credit risk / Finance / Liquidity risk / Business continuity / Political risk / Information security / Risk / Management / Security

Strategic Report Managing our risks Risk

Add to Reading List

Source URL: colt.annualreport2014.com

Language: English - Date: 2015-03-24 09:57:04
647Storage media / Data management / Data security / Computer storage / Backup / USB flash drive / Computer file / Data storage device / Hard disk drive / Information science / Computer hardware / Information

Sustainable IT tips: Storing information Storing information in a more energy efficient way  The more common and easily accessible a resource, the less we need to back it up; the more unique or expensive a resource, t

Add to Reading List

Source URL: www.apc.org

Language: English - Date: 2015-06-17 19:14:07
648Belgian Institute for Space Aeronomy / Information Services Procurement Library / Technology / Project management / Deliverable / Global Monitoring for Environment and Security

Title: NORS Web pages Deliverable number: D2.1 Revision 00 - Status: Final Date of issue: NORS Web pages

Add to Reading List

Source URL: nors.aeronomie.be

Language: English - Date: 2012-01-31 11:07:35
649Ethics / Risk management / Financial risk / Security / Data security / Asset / Risk parity / IT risk management / Risk / Management / Actuarial science

Risk Practice Viewpoint AIM for Risk Management Using Asset Information Data to Dramatically Transform Risk Management Companies are now able to collect far greater quantities of information about both their physical a

Add to Reading List

Source URL: www.adlittle.com

Language: English - Date: 2014-11-07 05:57:53
650Security / Computer security / Auditing / Information Systems Audit and Control Association / Certified Information Security Manager / International Multilateral Partnership Against Cyber Threats / COBIT / Corporate governance of information technology / Certified Information Systems Auditor / Data security / Information technology management / Information technology audit

Isaca_Cybersecurity_r2_v6_8.5x11

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2015-03-27 10:28:47
UPDATE