Security level management

Results: 626



#Item
201Information technology management / Public safety / Information security / National security / Prevention / Internal audit / ISO/IEC 27000-series / ISO / Data security / Security / Computer security

ISO/IEC Directives, Part 1, Consolidated ISO Supplement, 2014  Appendix 2 (normative) High level structure, identical core text, common terms and core definitions

Add to Reading List

Source URL: www.iso.org

Language: English - Date: 2015-02-10 03:53:14
202Service-level agreement / Software as a service / Middleware / Service-oriented architecture / Business transaction management / IICCRD / Cloud computing security / Cloud computing / Centralized computing / Computing

Microsoft Word - Cloud2010_06_05_2010_cr.doc

Add to Reading List

Source URL: www.iaas.uni-stuttgart.de

Language: English - Date: 2011-04-08 03:36:41
203Service-level agreement / Software as a service / Middleware / Service-oriented architecture / Business transaction management / IICCRD / Cloud computing security / Cloud computing / Centralized computing / Computing

Microsoft Word - Cloud2010_06_05_2010_cr.doc

Add to Reading List

Source URL: www.iaas.uni-stuttgart.de

Language: English - Date: 2011-04-08 03:36:41
204Computing / CollabNet / Collaborative software / Software engineering / Application lifecycle management / Software development process / DevOps / Software deployment / Cloud computing / Software development / Software / Software project management

Accellion secure file transfer appliances provide the highest level of security and ease of use of any managed file transfer so

Add to Reading List

Source URL: www.collabnet.cn

Language: English - Date: 2014-10-17 10:04:58
205Emergency management / Security / Actuarial science / Social vulnerability / International Decade for Natural Disaster Reduction / Vulnerability / Hazard / Disaster / Natural hazard / Management / Risk / Public safety

12th PPRD South “prevention and preparedness” workshop for staff-level officials “Multi-hazard risk assessment in urban environment” Lisbon, Portugal

Add to Reading List

Source URL: www.unisdr.org

Language: English - Date: 2012-10-09 06:42:53
206Emergency management / Hazard analysis / Security / Social vulnerability / Vulnerability / Politecnico di Milano / Risk assessment / Hazard / Disaster / Risk / Ethics / Management

12th PPRD South “prevention and preparedness” workshop for staff-level officials “Multi-hazard risk assessment in urban environment”

Add to Reading List

Source URL: www.unisdr.org

Language: English - Date: 2012-10-09 06:40:59
207Hashing / Enterprise application integration / Service-oriented architecture / SOA Security / HMAC / SHA-2 / Software engineering / Cryptography standards / Computing / Web services / Information technology management

TrustWay® box XML Gateway Bull and Vordel, partners in the supply of a certified, high-security Service-Oriented Architecture governance solution The TrustWay box XML Gateway guarantees a very high level of security a

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-11-29 07:31:10
208Information / Content-addressable storage / Backup / Information Lifecycle Management / Computer data storage / Email archiving / File system / Database / Enterprise content management / Computing / Information technology management / Data security

• Media Independence: In addition to disk, Assureon supports offline media such as tape and optical allowing user’s to benefit not only from the high level of security provided by the encryption on their tapes, but a

Add to Reading List

Source URL: www.abcsystems.ch

Language: English - Date: 2008-10-09 08:32:55
209Financial services / Funds / Actuarial science / Financial markets / Asset allocation / Collective investment scheme / Target date fund / Investment management / Personal finance / Financial economics / Investment / Finance

REDUCING SOCIAL SECURITY PRA RISK AT THE INDIVIDUAL LEVEL – LIFECYCLE FUNDS AND NO-LOSS STRATEGIES James Poterba MIT and NBER Joshua Rauh University of Chicago Graduate School of Business and NBER

Add to Reading List

Source URL: www.nber.org

Language: English - Date: 2006-12-20 10:37:48
210Cloud computing / Cloud infrastructure / Payment systems / Credit cards / Data / Basho Technologies / Riak / Payment Card Industry Data Security Standard / Distributed data store / Computing / NoSQL / Data management

CASE STUDY Riak Powers Payment Card Industry Solution Auric Systems International is a level 1 PCI DSS validated service provider and custom software development house specializing in Payment Card Industry (PCI) solutio

Add to Reading List

Source URL: media.basho.com

Language: English - Date: 2012-03-07 14:54:08
UPDATE