Security level management

Results: 626



#Item
101Waste / Risk / Security / Risk management / Radioactive waste / Low level waste / Nuclear Decommissioning Authority / Actuarial science / Management / Ethics

Determine and present path forward for acceptance and project initiation of uncompactible waste monitor and project closeout o

Add to Reading List

Source URL: llwrsite.com

Language: English - Date: 2015-03-25 04:53:19
102Risk management / Actuarial science / Geographic information systems / Security / Remote sensing / Cartography / ILWIS / Management / Risk / Ethics

A Shared GIS for the Hydrological Risk Management at National Level Valpreda Edi (*), Cremona Giuseppe (*) , Venditti Antonio (^), Milillo Antonio (^) (*) ENEA Via Don FiammelliBOLOGNA,

Add to Reading List

Source URL: itcnt05.itc.nl

Language: English - Date: 2005-02-02 17:00:00
103Professional accountancy bodies / Accountancy / Management / Professional certification / (ISC)² / International Association of Emergency Managers / Certified Information Security Manager / Information technology audit / Business Continuity Institute / Standards / Auditing / Business

Professional Certifications American College of Forensic Examiners International (ACFEI) - http://www.acfei.com CHS Level I – V – Certified in Homeland Security

Add to Reading List

Source URL: www.bcmanagement.com

Language: English - Date: 2010-03-09 09:43:03
104Data security / Corporate governance of information technology / Information Technology Infrastructure Library / Business architecture / EGovernment in Europe / Enterprise information security architecture / Information technology management / Enterprise architecture / Computing

Position: Information Technology Manager Level:

Add to Reading List

Source URL: www.shra.org.za

Language: English - Date: 2015-01-22 07:20:06
105Data security / Accountancy / Risk / Security / Certified Information Systems Auditor / Information Systems Audit and Control Association / Corporate governance of information technology / Audit / CISA / Information technology audit / Auditing / Information technology management

AFRICAN ADVANCED LEVEL TELECOMMUNICATIONS INSTITUTE (AFRALTI) TRAINING COURSE INFORMATION Course Dates: 5th July to 30th August 2014 CISA Exam Date & Location: 6th September 2014 Exam at EASA, Embakasi

Add to Reading List

Source URL: www.afralti.org

Language: English - Date: 2015-01-16 02:59:39
106Public safety / Prevention / Crime prevention / Department of Energy and Climate Change / National Nuclear Laboratory / Nuclear proliferation / Information security / Security awareness / Security controls / Computer security / Security / Data security

Security Policy The National Nuclear Laboratory (NNL) believes that its effective management of security and safeguards performance at operational and regulatory level is central to the success of the business. Scope The

Add to Reading List

Source URL: www.nnl.co.uk

Language: English - Date: 2014-04-23 13:20:54
10797th United States Congress / Nuclear Waste Policy Act / Yucca Mountain nuclear waste repository / Agency for Nuclear Projects / Yucca / Nevada National Security Site / Spent nuclear fuel / Basalt Waste Isolation Project / High-level radioactive waste management / Nevada / Nuclear technology / Radioactive waste

THE ROLE OF GEOLOGY AT THE PROPOSED YUCCA MOUNTAIN NUCLEAR WASTE REPOSITORY Overview of the Storage of High-Level Nuclear Waste at Yucca Mountain

Add to Reading List

Source URL: www.nirs.org

Language: English - Date: 2015-01-12 15:46:42
108Evaluation / Actuarial science / Risk analysis / Evaluation Assurance Level / Risk management / Vulnerability / Computer security / Systems engineering process / IT risk management / Risk / Ethics / Security

Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:30
109Nuclear physics / Yucca Mountain nuclear waste repository / Nuclear Waste Policy Act / Yucca / Dry cask storage / High-level radioactive waste management / Spent nuclear fuel / Nevada National Security Site / United States Department of Energy / Radioactive waste / Nuclear technology / Nevada

Eureka County, Nevada -- Yucca Mountain.org

Add to Reading List

Source URL: www.yuccamountain.org

Language: English - Date: 2015-02-22 19:24:25
110Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:23
UPDATE