Security level management

Results: 626



#Item
31Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
32

European Journal of Contemporary Economics and Management December 2014 Edition Vol.1 No.2 CHALLENGES FACED BY MIDDLE LEVEL MANAGERS IN THE DECISION MAKING PROCESS: A CASE OF G4S SECURITY SERVICES

Add to Reading List

Source URL: ejcem.eu

Language: English - Date: 2015-01-08 11:41:51
    33

    Security Policy The National Nuclear Laboratory (NNL) believes that its effective management of security and safeguards performance at operational and regulatory level is central to the success of the business. Scope The

    Add to Reading List

    Source URL: nnl.co.uk

    Language: English - Date: 2014-04-23 13:20:54
      34

      GB-250 Firewall UTM Appliance Family The GB-250 and GB-250e Firewall UTM Appliances are GTA’s entry level systems that provide big security for smaller business offices. Full Featured Unified Threat Management For Sma

      Add to Reading List

      Source URL: www.gta.com

      Language: English - Date: 2012-12-06 11:43:18
        35Public-key cryptography / Protection Profile / Common Criteria / Electronic signature / Public key certificate / Evaluation Assurance Level / Integrity / CAdES / Ethics / Evaluation / Computer security / Key management

        Microsoft Word - WD1 EN_14169-4_(E)_v1.0.1_KGTCCGA.doc

        Add to Reading List

        Source URL: sogis.eu

        Language: English - Date: 2013-02-14 10:25:38
        36National security / DEFCON / State of emergency / Emergency / Public safety / Emergency management / Management

        VII Dec. IStates of Emergency) The DEFCON system is to be used to indicate the security level of the country, and the risk to the continued existence of the Empire as a sovereign state. The DEFCON level is to be

        Add to Reading List

        Source URL: austenasia.webs.com

        Language: English
        37Service-level agreement / Management / Education in the United States / North Central Association of Colleges and Schools / Oak Ridge Associated Universities / University of Arkansas for Medical Sciences

        Campus Operations Service Level Agreement UAMS Police/Security Department And XXXX Department

        Add to Reading List

        Source URL: www.uams.edu

        Language: English - Date: 2013-01-07 08:51:26
        38Nye County /  Nevada / Yucca / Nevada National Security Site / Nye / High-level radioactive waste management / United States Department of Energy / City / Yucca Mountain nuclear waste repository / Nevada / Radioactive waste / Amargosa Desert

        Resolution NoRESOLUTION STATING THE INTENT OF NYE COUNTY TO ACTIVEL Y AND CONSTRUCTIVEL Y ENGAGE WITH THE U.S. DEPARTMENT OF ENERGY (DOE), THE ADMINISTRATION, AND

        Add to Reading List

        Source URL: www.nyecounty.com

        Language: English - Date: 2008-05-04 12:55:38
        39Computing / Computer network security / National security / Information technology management / Security service / Information security / Service-level agreement / Security controls / Data center / Security / Data security / Computer security

        DOC Document

        Add to Reading List

        Source URL: www.cio.ca.gov

        Language: English - Date: 2013-06-28 15:17:35
        40Information technology audit / United States Department of Homeland Security / Risk / Financial audit / Audit / Information technology controls / Entity-level controls / Internal control / Information technology audit process / Auditing / Accountancy / Business

        Information Technology Management Letter for the FY 2014 Department of Homeland Security Financial Statement Audit

        Add to Reading List

        Source URL: www.oig.dhs.gov

        Language: English - Date: 2015-05-27 13:16:32
        UPDATE