Security level management

Results: 626



#Item
241PL/SQL / Null / SQL / From / Oracle Database / Join / Insert / View / Predicate / Data management / SQL keywords / Computing

Row Level Security – pt.2 – Security Policies In the previous article in this mini-series, I demonstrated a couple of low-impact methods for enforcing data isolation between different users, or groups of users. In t

Add to Reading List

Source URL: www.jlcomp.demon.co.uk

Language: English - Date: 2007-09-24 09:03:46
242Information technology management / Cloud storage / Contract law / Outsourcing / Service-level agreement / Statement of work / Data center / Government procurement in the United States / Cloud computing security / Cloud computing / Computing / Concurrent computing

CLOUD CONTRACTS WHAT PROVIDERS AND CUSTOMERS SHOULD DISCUSS Catalogue of recommended contractual components in General Terms and Conditions of Business (AGB) and Service Level Agreements (SLA) for Cloud Service Providers

Add to Reading List

Source URL: www.eurocloud.org

Language: English - Date: 2013-06-02 09:29:04
243Terrorism / Computer security / Anticipatory thinking / Bioterrorism / Futurology / United States Department of Homeland Security / Biosecurity / Risk assessment / Chemical /  biological /  radiological /  and nuclear / Risk / Management / Biological warfare

ClassificAtion Level: Unclassified 2.1 TASK

Add to Reading List

Source URL: www.anibiothreat.com

Language: English - Date: 2013-10-08 02:56:14
244Technology / Computer printers / Information technology management / Office equipment / Common Criteria / Multifunction printer / Protection Profile / Evaluation Assurance Level / Security Target / Evaluation / Computing / Computer security

Ärendetyp: 6 Diarienummer: 12FMV5054-81:1 Dokument ID HEMLIG/

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2014-02-10 07:51:58
245Technology / Security appliance / SonicWALL / Protection Profile / Common Criteria / Unified threat management / National Security Agency / Stateful firewall / Computer appliance / Computer network security / Computing / Computer security

Dell SonicWALL, Inc. SonicOS Enhanced v5.9.0 on NSA Series and TZ Series Appliances Security Target Evaluation Assurance Level (EAL): EAL4+ Document Version: 1.1

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2014-06-18 04:52:56
246Computer security / Crime prevention / National security / Emergency management / Computer network security / Information security / Laboratory information management system / Chemical /  biological /  radiological /  and nuclear / Risk assessment / Security / Public safety / Management

ClassificAtion Level: Unclassified 2.2 TASK

Add to Reading List

Source URL: www.anibiothreat.com

Language: English - Date: 2013-10-08 02:56:15
247Public safety / Emergency management / Actuarial science / Security / Insurance / Hazard / Building Safer Communities. Risk Governance /  Spatial Planning and Responses to Natural Hazards / IT risk management / Management / Risk management / Risk

Strategy Protection against Natural Hazards Security Level for Natural Hazards

Add to Reading List

Source URL: www.planat.ch

Language: English - Date: 2015-01-09 05:48:05
248Content management systems / Computer network security / PHP programming language / Akismet / Sucuri / Spam in blogs / .htaccess / Software / WordPress / Blog software

INFORMATION SECURITY GUIDELINE Securing WordPress Introduction 1. WordPress is a popular content management system and is frequently targeted for attacks; this hardening guide is meant to further enhance the level of sec

Add to Reading List

Source URL: cio.ubc.ca

Language: English - Date: 2015-01-12 12:52:43
249Terrorism / Nuclear physics / Dirty bomb / Radiological weapon / New York City Fire Department / September 11 attacks / Certified first responder / Homeland security / Nuclear terrorism / Nuclear weapons / Emergency management

"Dirty Bomb" Attack: Assessing New York City's Level of Preparedness from a First Responder's Perspective

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 03:38:07
250Ethics / Risk / Emergency management / Regulatory compliance / Security / Management / Actuarial science / Risk management

Major Information Technology Projects Summary Table Includes projects that have a cost exceeding $1 million in FY16-17 and those of statewide significance such as enterprise-level solutions, enterprise resource planning,

Add to Reading List

Source URL: ofm.wa.gov

Language: English - Date: 2015-01-23 17:27:15
UPDATE