Security information management

Results: 13712



#Item
881Copyright collection societies / International Standard Audiovisual Number / ISO 15706-2 / Information / Isan / Security / Association of International Collective Management of Audiovisual Works / Confédération Internationale des Sociétés d´Auteurs et Compositeurs / International Article Number / Universal identifiers / Identifiers / ISO standards

ISAN User Guide ISAN International Agency 26, rue de Saint Jean CH-1203 Geneva Switzerland

Add to Reading List

Source URL: www.aribsan.org

Language: English - Date: 2011-11-25 04:18:00
882Data / Data security / Software development process / Information technology management / Needs assessment / Black Hat Briefings / Federal Information Security Management Act / Hacker / Information security / Computer security / Security / Computing

Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
883Database security / Database / Personal digital assistant / ACT! / Data / Computing / Password / Information technology management

Administering ACT! 2007 The Basics So You Get to be the ACT! Administrator ACT! vs. ACT! Premium

Add to Reading List

Source URL: www.cornerstonesolutions.com

Language: English - Date: 2013-03-01 18:48:12
884Management / Ethics / United States Environmental Protection Agency / Superfund / Hazardous waste / Federal Information Security Management Act / Risk / Mel Bernie Company / Environment of California / California Department of Toxic Substances Control / Environment

FISMA_Review_of_Internal_Control_Systems_2013_2014

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2014-07-25 16:52:29
885Computing / National Institute of Standards and Technology / NIST Special Publication 800-53 / Risk management / Federal Information Security Management Act / Security controls / Information security / Risk management framework / Privacy / Computer security / Security / Data security

DRAFT Special Publication 800-53A Revision 4, Federal Information Systems and Organizations: Building Effective Assessment Plans has been approved as FINAL by the following publication: Publication Number: Special Publi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 11:42:50
886Privacy / Internet privacy / Ubiquitous computing / Cloud computing / Information privacy / Privacy Office of the U.S. Department of Homeland Security / Ethics / Identity management / Law

PRIVACY THREATS IN UBIQUITOUS COMPUTING (PTUC) 1st International Workshop on Privacy Threats in Ubiquitous Computing In Conjunction with the 12th IEEE International Conference on Ubiquitous Intelligence and Computing (U

Add to Reading List

Source URL: www.cybermatics.org

Language: English
887Social Security / Dictionary of Occupational Titles / Management / Zip / Computer file / Business / Standard Occupational Classification System / Human resource management / Occupations / Occupational Information Network

O*NET 10.0 Development Database SAS/PC File Names and Sources National Crosswalk Service Center June 2006 Core Files (NET10SAS.ZIP): These files are described in DataDictionary10_0.pdf. Revisions are included with each n

Add to Reading List

Source URL: webdata.xwalkcenter.org

Language: English - Date: 2006-06-23 08:32:22
888Risk / Information technology management / Computer-aided audit tools / Certified Information Security Manager / Internal audit / Audit / Information technology audit process / Information Systems Audit and Control Association / Auditing / Information technology audit / Accountancy

INFORMATION SYSTEMS AUDITOR – HR/ISAJob Purpose Reporting to the Chief Manager, Internal Audit, Risk & Compliance, and the holder will undertake reviews of the NKCC’s ICT infrastructure and provide assura

Add to Reading List

Source URL: newkcc.co.ke

Language: English - Date: 2015-02-10 12:33:38
889Information technology management / Security / Web applications / Web development / Online shopping / Microsoft Commerce Server / Application security / Computer security / Mail order / Electronic commerce / Business / Marketing

Color profile: Generic CMYK printer profile Composite Default screen Begin8 / Network Security: A Beginner’s Guide / MaiwaldBlind Folio 17:403

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2003-10-04 03:20:51
890Data security / Computer network security / Crime prevention / National security / Information security / Federal Information Security Management Act / Vulnerability / Cloud computing security / Managed security service / Computer security / Security / Cyberwarfare

Information Security Challenges www.KahnConsultingInc.com Evaluation: Meridio

Add to Reading List

Source URL: www.kahnconsultinginc.com

Language: English - Date: 2007-09-05 16:18:00
UPDATE