Security information management

Results: 13712



#Item
871Information technology management / Enterprise architecture / ISO standards / Enterprise modelling / Integrated development environments / Enterprise Architect / Model-driven engineering / Entity-relationship model / Modeling language / Unified Modeling Language / Software engineering / Data modeling

Sparx Systems Enterprise Architect Supports Security Industry Association Standards Development Leading trade group in the electronic and physical security market adopts premier modeling tool for development of standards

Add to Reading List

Source URL: sparxsystems.com.au

Language: English - Date: 2013-07-22 11:31:41
872Computing / Data privacy / Computer law / Law / Regulatory compliance / Payment Card Industry Data Security Standard / Information security / Health Insurance Portability and Accountability Act / Akamai Technologies / Computer security / Data security / Security

AKAMAI FEATURE Akamai Compliance Management Reduce Risk with SSL Delivery and Acceleration Services Help support PCI, ISO, FISMA, BITS and HIPAA Compliance Initiatives Maintaining regulatory compliance for your business

Add to Reading List

Source URL: www.akamai.fr

Language: English - Date: 2013-05-02 06:58:00
873Information technology management / Open Financial Exchange / Data aggregator / Account aggregation / Transaction authentication number / Authentication / Password / Security Assertion Markup Language / Hypertext Transfer Protocol / Computing / Security / Computer file formats

DOC Document

Add to Reading List

Source URL: www.ofx.net

Language: English - Date: 2007-10-17 21:09:52
874Credit card / Business / Commerce / Information technology management / Bank card number / Electronic commerce / Merchant services / Card security code

Payment by Credit Card VISA MasterCard Amount in €

Add to Reading List

Source URL: www.uni-assist.de

Language: English - Date: 2012-01-31 10:29:31
875Law / Identity management / Social issues / Data privacy / Internet privacy / Information privacy / Data Protection Act / Computer security / Data security / Ethics / Privacy / Security

Data and Privacy Policies Data security policy We control physical security in relation to the information and personal data that is contained at our facilities and restrict access to the site, buildings, computer rooms,

Add to Reading List

Source URL: www.protirus.com

Language: English - Date: 2015-02-04 10:04:56
876Crime prevention / National security / Computer security / Information security / Backup / Application software / Computer network / Access control / Database management system / Security / Public safety / Data security

INTOSAI EDP COMMITTEE Information Systems Auditing – Glossary of ICT Terms Information Systems Auditing – Glossary of Terms Subject/term/acronym Description

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-31 00:02:06
877Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:08
878UN-SPIDER / United Nations / Global Monitoring for Environment and Security / Management / Global Earth Observation System of Systems / Group on Earth Observations / International development / Crowdsourcing / Public safety / Remote sensing / Disaster preparedness / Geographic information systems

Promoting Cooperative Solutions for Space Sustainability Building Appropriate Institutions to Support the Use of Earth Observations for Human Security Agnieszka Lukaszczyk

Add to Reading List

Source URL: swfound.org

Language: English - Date: 2011-07-08 08:40:02
879Public safety / Birla Institute of Technology and Science / Computer security / Information security / Institute of Electrical and Electronics Engineers / Security engineering / Cloud computing / Knowledge management / Pilani / Security / Crime prevention / National security

CALL FOR PAPERS A Special Issue on Secure Knowledge Management in Big-data era Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living

Add to Reading List

Source URL: www.som.buffalo.edu

Language: English - Date: 2014-06-30 22:56:35
880Information technology management / Marketing / Interactive kiosk / Kiosks / Credit cards / Kiosk software / Kiosk / Payment Card Industry Data Security Standard / Online shopping / Electronic commerce / Business / Payment systems

case study: mzero software solutions for retail husqvarna endless aisle retail kiosk TM zero boundaries. infinite possibilities.

Add to Reading List

Source URL: mzero.com

Language: English - Date: 2015-03-24 16:39:49
UPDATE