Security information management

Results: 13712



#Item
731Formal specification / Specification / Technology / Management / Form / Java specification requests / Formal methods / Mobile Information Device Profile

Motivation Specification Verification Refinement A Formal Specification of the MIDP 2.0 Security Model 1 ยด

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
732Building engineering / Technology / Computer-aided design / Data modeling / Emergency evacuation / Systems engineering / Simulation / Building management system / ISO 10303 / Building information modeling / Construction / Architecture

3 Safety and security Scenarios The scope of the project is to create a resilient building complex, not only

Add to Reading List

Source URL: www.elasstic.eu

Language: English - Date: 2014-12-11 09:48:09
733Backup / Data security / NetApp / Computer data storage / Electronic engineering / ErgoGroup / Storage area network / Information / Computing / Data management / Computer storage

About Proact Proact is a specialist in storage, archiving and securing large volumes of mission-critical information. As an independent integrator, Proact provides systems, support and consulting services within its focu

Add to Reading List

Source URL: www.proact.de

Language: English - Date: 2012-01-23 11:02:01
734Identity management / Privacy / Personal life / Personally identifiable information / Data security / Social issues / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Information security / Ethics / Security / Computing

U.S. Department of Commerce [Bureau Name]

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2015-05-12 15:01:24
735Health / Chief information security officer / Chief information officer / Information security / Records management / Center for Information Technology / John F. Jones /  Jr. / National Institutes of Health / Medicine / Management

NIH E-Mail Message Backup Policy

Add to Reading List

Source URL: ocio.nih.gov

Language: English - Date: 2012-11-06 13:12:27
736Risk management / Actuarial science / Computer security / Auditing / Risk assessment / Audit / Information security / Internal audit / Risk / Management / Security

shared assessments final logo.eps

Add to Reading List

Source URL: sharedassessments.org

Language: English - Date: 2015-05-07 13:13:26
737Identity management / Public safety / Internet privacy / McCombs School of Business / Information security / Privacy / Personally identifiable information / Security / Ethics / Identity

undergraduate_studies_PMSc_formal

Add to Reading List

Source URL: msims.ischool.utexas.edu

Language: English - Date: 2015-03-23 13:50:23
738Public safety / Crime prevention / Computer security / Information security management system / Biometrics / ISO/IEC 27001 / Corporate governance of information technology / Information security / Surveillance / Security / Data security / National security

CASE STUDY The Voice of Security Top voice biometric specialist secures ISO27001 re-certification VoiceVault is a specialist industry leader in the provision of voice-based biometric

Add to Reading List

Source URL: certificationeurope.com

Language: English - Date: 2012-12-03 14:54:49
739Data security / Public safety / Actuarial science / Risk / Information security management system / Information security / Security risk / Risk management / Business continuity / Security / Computer security / Management

INFORMATION SECURITY EXECUTIVE SUMMARY Overview

Add to Reading List

Source URL: www.sccs.com.au

Language: English - Date: 2014-03-10 05:21:17
740Business / Chief information security officer / Information security / Certified Public Accountant / Audit / Question / Corporate title / Management / Security / Computer security

IN T HIS IS S UE From the Managing Principal C-Suite IT Security Officers Conflict-of-Interest Risks

Add to Reading List

Source URL: www.berrydunn.com

Language: English - Date: 2015-03-04 10:27:56
UPDATE