Security information management

Results: 13712



#Item
651NetApp / VMware / Computing / Backup / Data security

Case study Scalable storage solution improves Alfa Laval information management Engineering company Alfa Laval needed to free up storage capacity and enhance performance in its virtualised server environment. The old ba

Add to Reading List

Source URL: www.proact.dk

Language: English - Date: 2012-01-23 10:36:06
652Internet / Privacy / Identity management / Personal life / Personally identifiable information / HTTP cookie / Email / In re Gateway Learning Corp. / Privacy Office of the U.S. Department of Homeland Security / Ethics / Computing / Internet privacy

Privacy Policy Last Modified: April 3, 2015 1

Add to Reading List

Source URL: jessieenglish.jamberrynails.net

Language: English - Date: 2015-05-13 12:31:31
653Internet privacy / Computing / Identity management / Law / Sodexo / HTTP cookie / Personally identifiable information / Information security / Anonymity / Ethics / Privacy / Security

Microsoft Word - US_CATERTRAX WEBSITE PRIVACY STATEMENT .doc

Add to Reading List

Source URL: uaa-aac.catertrax.com

Language: English - Date: 2014-05-16 10:51:14
654Technology / Software quality / Data security / Formal methods / Systems engineering process / IT risk management / Quality assurance / Reliability engineering / Software development process / Systems engineering / Science / Information technology management

Department of Information Technology IV&V Guidelines [Which, e.g. Initial, Interim, Final] IV&V Report: [Agency Name] [Deliverable Name and/or #]

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-07-21 15:53:24
655Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncsc.gov

Language: English - Date: 2012-05-15 07:38:22
656Socioeconomics / Unemployment / Current Population Survey / Social Security / Employment / Labor force / Bureau of Labor Statistics / Sick leave / Discouraged worker / Labor economics / Economics / Human resource management

A Profile Of Older Workers In Colorado Local Employment Dynamics Executive Summary A new information source, the Local Employment Dynamics (LED) program for

Add to Reading List

Source URL: www.census.gov

Language: English - Date: 2005-02-16 12:19:22
657Information security management system / Government / Medicare / Committee / Structure / Politics / Healthcare reform in the United States / Data security

Executive Committee Meeting Monday, May 5, 2014 6:30 p.m. Boardroom Trinity Medical Center, 7th Street Campus MINUTES

Add to Reading List

Source URL: www.qcmso.com

Language: English - Date: 2014-09-19 17:56:04
658Security / Emergency management / Humanitarian aid / Occupational safety and health / Business continuity / Santa Rosa County /  Florida / Tax return / Emergency / Public safety / Management / Disaster preparedness

Business Emergency Response Toolkit CHECKLIST For Business Disaster Your BERT Bag should contain copies of important information, documents, and supplies essential for your business to recover quickly as well as document

Add to Reading List

Source URL: www.santarosaedo.com

Language: English - Date: 2014-07-23 16:07:36
659Computing / Information Risk Management / Risk analysis / DE-CIX / European Network and Information Security Agency / CIX / Threat / Information security / Internet / Computer security / Security / Data security

Press Release Together with ENISA, DE-CIX develops study about Internet threats Secure Internet for all: Study offers guidelines for operators of Internet infrastructure Frankfurt/Main, March 04, 2015 – Internet users

Add to Reading List

Source URL: press.de-cix.net

Language: English - Date: 2015-03-04 08:25:24
660Standards for Security Categorization of Federal Information and Information Systems / Government procurement in the United States / Federal Information Security Management Act / Procurement / National Oceanic and Atmospheric Administration / Business / Government / Management / Computer security / National Institute of Standards and Technology / Military acquisition

Acquisition AlertSupply Chain Risk Management for Acquiring High and Moderate lmpact Information Systems

Add to Reading List

Source URL: www.ago.noaa.gov

Language: English - Date: 2015-06-02 22:02:09
UPDATE