Security information management

Results: 13712



#Item
701Prevention / Public safety / Criminology / Lockdown / Fire alarm system / Emergency evacuation / Emergency procedure / Door / Elevator / Safety / Emergency management / Security

EMERGENCY PROCEDURES These procedures set forth the steps to be followed in the event of an emergency. It is important that all employees thoroughly familiarize themselves with this information. In any emergency situatio

Add to Reading List

Source URL: nursing.unc.edu

Language: English - Date: 2014-09-15 15:49:06
702Password / Privacy / Ethics / Identity management / Internet privacy

Your Privacy and Security is our Top Priority   Thought Cycle will not share student, teacher or parent information with any other parties without  your consent or unless required by law to

Add to Reading List

Source URL: s3-us-west-1.amazonaws.com

Language: English - Date: 2014-05-01 14:58:48
703NetApp / VMware / Computing / Backup / Data security

Case study Scalable storage solution improves Alfa Laval information management Engineering company Alfa Laval needed to free up storage capacity and enhance performance in its virtualised server environment. The old ba

Add to Reading List

Source URL: www.proact.fi

Language: English - Date: 2012-01-23 10:36:06
704Security / Internet privacy / Identity management / Social issues / Personally identifiable information / Information security / HTTP cookie / In re Gateway Learning Corp. / P3P / Ethics / Privacy / Computing

Grill Concepts Privacy Policy Effective Date: June 5, 2012 Grill Concepts, Inc. (the “Company”) recognizes and respects the privacy of visitors to this Site and has created this Privacy Policy to demonstrate our comm

Add to Reading List

Source URL: grillconcepts.com

Language: English - Date: 2012-08-29 22:27:45
705Constitutional law / Government / Law enforcement / State of emergency / Emergency Alert System / Office of Emergency Management / United States Department of Homeland Security / Federal Emergency Management Agency / Beaver Valley Nuclear Generating Station / Public safety / Emergency management / Management

West Virginia Division of Homeland Security and Emergency Management Hancock County Office of Emergency Management Media Information Beaver Valley Power Station

Add to Reading List

Source URL: www.dhsem.wv.gov

Language: English - Date: 2015-01-08 13:52:00
706System administration / Internet protocols / Internet standards / System software / Syslog / Security event manager / Computer data logging / Syslog-ng / Microsoft SQL Server / Network management / Computing / Information technology management

Guy Bruneau, GSE About Me Senior Security Consultant @ipss inc.  Incident Handler @Internet Storm Center 

Add to Reading List

Source URL: handlers.sans.org

Language: English - Date: 2014-09-07 10:31:32
707Computer security / Federal Information Security Management Act / United States House Committee on Oversight and Government Reform / Politics of the United States / Mark Souder / William Lacy Clay /  Jr. / Office of Management and Budget / Certification and Accreditation / Eleanor Holmes Norton / Computer law / Evaluation / Government

FEDERAL IT SECURITY: THE FUTURE OF FISMA JOINT HEARING BEFORE THE SUBCOMMITTEE ON INFORMATION POLICY,

Add to Reading List

Source URL: house.resource.org

Language: English - Date: 2011-02-09 15:30:02
708Computer network security / Data security / Content-control software / Fortinet / Database security / Database activity monitoring / Security information and event management / Vulnerability / Database / Computing / Computer security / Cyberwarfare

DATA SHEET FortiDB™ Database Security and Compliance FortiDB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:06
709Computing / Information Technology Infrastructure Library / Information technology management / Method engineering / Standards / Information security / Strategic management / Enterprise architect / Central Intelligence Agency / Management / Data security / Security

SAM – INFORMATION TECHNOLOGY (California Department of Technology) Note: Effective January 1, 2008, the Office of Information Security (Office) restructured and renumbered the content and moved SAM Sections 4840 – 48

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2015-02-06 09:51:04
710Firefox add-ons / Malware / Information technology management / Pop-up ad / Google Toolbar / Yahoo! Toolbar / Taskbar / Norton Internet Security / Windows Live Toolbar / Software / Mozilla add-ons / Proprietary software

Microsoft Word - PopUpBlockers.doc

Add to Reading List

Source URL: tapemonline.melaka.gov.my

Language: English
UPDATE