Security level management

Results: 626



#Item
41Integrating the Healthcare Enterprise / Security Assertion Markup Language / DICOM / SAML 2.0 / Health Level 7 / Healthcare Information and Management Systems Society / Identity provider / Liberty Alliance / Retrieve Information for Display / Medical informatics / Medicine / Health

Cross-Enteprise User Authentication

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2005-08-15 18:36:30
42Ethics / Energy / Security / Project management / Risk management / Operational risk / Smart meter / Risk / Actuarial science / Management

Risk management - Nice Grid Pilot Project Level of control Probability of occurrence 1

Add to Reading List

Source URL: grid4eu.blob.core.windows.net

Language: English - Date: 2015-03-13 12:33:55
43Identity / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Authentication / Identity assurance / Identity management / System software / Computer security

GOV.UK Verify Architecture Overview High level architecture overview GOV.UK Verify enables a user to be identified at a service provider with a required  level of assurance, but without revealing any

Add to Reading List

Source URL: alphagov.github.io

Language: English - Date: 2015-06-08 12:02:04
44Soft matter / Matter / Natural resources / Poverty / World Water Forum / Infrastructure / Organisation for Economic Co-operation and Development / Water supply / Adaptation to global warming / Water / Development / Water management

WATER: FIT TO FINANCE? CATALYZING NATIONAL GROWTH THROUGH INVESTMENT IN WATER SECURITY REPORT OF THE HIGH LEVEL PANEL

Add to Reading List

Source URL: www.worldwatercouncil.org

Language: English - Date: 2015-04-15 04:18:13
45Nuclear technology / Environmental economics / Amargosa Desert / Nye County /  Nevada / Hazardous waste / Nuclear Waste Policy Act / Deep geological repository / Nevada National Security Site / High-level radioactive waste management / Nevada / Radioactive waste / Environment

Microsoft WordSEIScum impacts.doc

Add to Reading List

Source URL: www.nyecounty.com

Language: English - Date: 2009-08-04 16:09:30
46Cryptography / Password policy / Privileged password management / Password / Security / Computer security

How to Create Professional Accounts from the I Have A Plan Iowa® Professional Center Note: This feature is only available to users who have administrative level access. 1. Sign into your Professional Center Account at:

Add to Reading List

Source URL: www.iowacollegeaid.gov

Language: English - Date: 2014-08-04 11:28:29
47Cyberwarfare / Stateful firewall / Firewall / Virtual firewall / Check Point / Computer network security / Computer security / Computing

Firewall management is resource-intensive and requires a high level of expertise to prevent unauthorized access and costly breaches. Devices must be provisioned, deployed, upgraded and patched to keep up with the latest

Add to Reading List

Source URL: www.spiritcom.com

Language: English - Date: 2014-12-10 12:02:02
48AlgoSec / Infrastructure optimization / Managed security service / Service-level agreement / Computing / Information technology / Technology / Computer network security / Information technology management / Outsourcing

The AlgoSec Suite for Managed Security Service Providers Firewall and network security management are among the most complex, labor-intensive offerings that MSSPs deliver. MSSPs seeking a competitive advantage are turnin

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:02
49Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:08
50Business / Risk management / Solvency II Directive / Security / Risk / European Insurance and Occupational Pensions Authority / Capital requirement / Derivative / PillarOne.RiskAnalytics / Actuarial science / Management / Ethics

ANNEX I: LIST OF POLICY ISSUES AND OPTIONS FOR THE LEVEL 2 IMPACT ASSESSMENT OF SOLVENCY II (VERSION 1.0) DISCLAIMER This document has been written exclusively for the purpose of this Call for Advice. Whilst this list of

Add to Reading List

Source URL: www.knf.gov.pl

Language: English - Date: 2011-09-07 07:22:53
UPDATE