Security information management

Results: 13712



#Item
761Internet / Privacy / Identity management / Personal life / Personally identifiable information / HTTP cookie / Email / In re Gateway Learning Corp. / Privacy Office of the U.S. Department of Homeland Security / Ethics / Computing / Internet privacy

Privacy Policy Last Modified: April 3, 2015 1

Add to Reading List

Source URL: totallythebomb.jamberrynails.net

Language: English - Date: 2015-05-13 12:31:31
762Emergency management / Government / Emergency services / Grants / Federal Emergency Management Agency / Funding Opportunity Announcement / EMPG / United States Department of Homeland Security / Federal grants in the United States / Federal assistance in the United States / Public finance / Public safety

FY 2013 EMERGENCY MANAGEMENT PERFORMANCE GRANTS (EMPG) PROGRAM FUNDING OPPORTUNITY ANNOUNCEMENT (FOA) OVERVIEW INFORMATION Issued By U.S. Department of Homeland Security (DHS): Federal Emergency Management

Add to Reading List

Source URL: www.nmdhsem.org

Language: English - Date: 2015-02-04 13:29:31
763Security / Disaster preparedness / Humanitarian aid / Critical infrastructure protection / Resilience / Australian Intelligence Community / Psychological resilience / Infrastructure / National Telecommunications and Information Administration / National security / Public safety / Emergency management

The Australian Government’s Critical Infrastructure Resilience Strategy: Plan INTRODUCTION The Australian, State and Territory governments share the following definition of critical infrastructure: ‘those physical f

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2015-05-25 22:01:43
764Information / Backup / Data security / XML / Spreadsheet / Database / Computing / Data / Database management systems

InPort Where should I store it? Catalog Editor

Add to Reading List

Source URL: ias.pifsc.noaa.gov

Language: English - Date: 2006-07-10 15:18:54
765Early voting / Firewall / Government / Accountability / Elections / Computer network security / Politics

POLL MANAGEMENT SOFTWARE EVER WISH YOU COULD MANAGE YOUR POLL PLACES FROM THE CONVENIENCE OF YOUR PC OR SMARTPHONE? CentralPoint is a web-based application that displays, monitors and tracks poll place information in re

Add to Reading List

Source URL: www.essvote.com

Language: English - Date: 2015-04-01 10:27:16
766Social enterprise / Bookshare / Skype / Backup / Computer security / Human Rights Data Analysis Group / Software / Computing / Benetech

Partnership with Benetech, a non-profit organization that develops and supports Martus, secure information management software for human rights monitoring. 1 Benetech creates and develops new technology solutions that

Add to Reading List

Source URL: martus.org

Language: English - Date: 2015-02-06 14:53:45
767Data management / Backup / Data security / Computer data storage / USB flash drive / Data deduplication / Hard disk drive / Database / IBM SAN Volume Controller / Computer hardware / Computing / Information

Case Study Increases Throughput And Expands Storage Capacity Brigham Young University Hawaii graduated its first class of ten students in June of 1956, when it was known as the Church College of Hawaii. Nearly 60 years

Add to Reading List

Source URL: pages.tegile.com

Language: English - Date: 2015-05-27 10:07:14
768Technology / Radio resource management / Signal processing / Channel / Information theory / Frequency-hopping spread spectrum / Software-defined radio / Radio / Antenna / Telecommunications engineering / Electronic engineering / Radio electronics

They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices Shyamnath Gollakota †

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2011-07-19 13:41:19
769Public safety / Information Risk Management / Actuarial science / Information security / Information assurance / Risk / Certified Information Systems Security Professional / Certified Information Security Manager / Information technology audit / Data security / Computer security / Security

Information Assurance Analyst NuHarbor is looking for an Information Assurance Analyst! Join an elite team of security professionals who are driven for success in finding innovative ways to solve problems for our company

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-03-24 14:48:13
770SAP Business Suite / Software / Information technology management / ERP software / SAP / SAP ERP / SAP NetWeaver / Business software / Open Travel Alliance / SAP AG

ADVERTORIAL Data security in product development Keeping product data under secure control

Add to Reading List

Source URL: www.dscsag.com

Language: English - Date: 2014-05-23 04:26:08
UPDATE