Security management

Results: 59084



#Item
391Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:21:36
392Software / Reputation management / McAfee / Freeware / McAfee SiteAdvisor / Antivirus software / Intel Security / Adviser / Norton Safe Web

FAQ SiteAdvisor FAQ (Revision Date: Table of Contents SiteAdvisor FAQ ...........................................................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-04-03 12:17:07
393Water / Natural environment / Natural resources / Water management / Water supply / International Commission on Irrigation and Drainage / International Water Management Institute / Irrigation / World Water Day / World Water Assessment Programme / Sustainable agriculture / Food security

INTERNATIONAL COMMISSION ON IRRIGATION AND DRAINAGE News Update Managing Water for Sustainable Agriculture

Add to Reading List

Source URL: www.icid.org

Language: English - Date: 2016-07-21 06:14:26
394Water / Physical geography / Flood control / Hydrology / Geography of Oklahoma / Floodplain / Riparian zone / Wetlands / Flood mitigation / Tulsa /  Oklahoma / Resilience / Federal Emergency Management Agency

Welcome to the Resilient Neighbors Network Seminar For audio Call: (Access code: Security code: 4567

Add to Reading List

Source URL: silverjackets.nfrmp.us

Language: English - Date: 2014-02-14 11:09:51
395Information technology / Administration / Public records / Computing / Records management / Information technology management / Content management systems / Information security / Digital preservation / Retention period / Freedom of information laws by country / Information privacy

Information Management Toolkit for Schools Version 5 ยท 01 February 2016 SPONSORED BY

Add to Reading List

Source URL: www.irms.org.uk

Language: English - Date: 2016-02-01 11:07:24
396Probability / Risk / Safety / Actuarial science / Disaster preparedness / Security / Risk management / Emergency management / Social vulnerability / United Nations International Strategy for Disaster Reduction / Enterprise risk management

15__2009_Berlin_Risk_Management_Workshop_Report_x

Add to Reading List

Source URL: www.codata-germany.org

Language: English - Date: 2014-06-10 04:37:19
397Wireless sensor network / Wireless networking / Computing / Wireless / Technology / Sensor node / Wireless ad hoc network / Linear network coding / ANT / Computer security / Peer-to-peer / Draft:Energy related security attacks

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:33:06
398Engineering / Ethics / Academia / Chemical engineering / Commodity chemicals / Project management / Risk management / Security / Systems engineering / Hanford Site / Risk analysis / Environmental engineering

Microsoft WordCWP BIOGRAPHICAL SKETCH.doc

Add to Reading List

Source URL: www.cresp.org

Language: English - Date: 2015-10-30 11:11:07
399Auditing / Prevention / Economy / Business / Security / Actuarial science / Computer security / Data security / Risk management / Internal control / Information security / Ramboll Environ

AffinityRisk & Compliance Report_v2.indd

Add to Reading List

Source URL: stakeholder.affinitywater.co.uk

Language: English - Date: 2015-07-27 10:00:31
400Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
UPDATE