Security management

Results: 59084



#Item
451Prevention / Safety / Security / Emerging technologies / National security / Cyberwarfare / Crime prevention / Risk management / Unmanned aerial vehicle / Computer security / Risk assessment / Central Intelligence Agency

UNCLASSIFIED Oude WaalsdorperwegAK Den Haag P.O. BoxJG The Hague

Add to Reading List

Source URL: www.thehaguesecuritydelta.com

Language: English - Date: 2016-04-07 04:25:36
452Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / SAML 2.0 / Shibboleth / XACML / OpenID / OAuth

Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
453Insurance / Water / Types of insurance / Economy / Hydrology / National Flood Insurance Program / United States Department of Homeland Security / Flood insurance / Floodplain / Flood / Home insurance / Homeowner Flood Insurance Affordability Act

YOUR HOME MAY NOW BE IN THE FLOODPLAIN! Re: Revised National Flood Insurance Program (NFIP) rates effectiveSome History: Federal Emergency Management Agency (FEMA) and the Harris County Flood Control District (

Add to Reading List

Source URL: www.ccfcc.org

Language: English - Date: 2008-03-18 00:41:58
454Environmentalism / Sustainability

MINISTRY OF WATER AND IRRIGATION KENYA WATER SECURITY AND CLIMATE RESILIENCE PROJECT COASTAL REGION WATER SECURITY AND CLIMATE RESILIENCE PROJECT TERMS OF REFERENCE GRANTS MANAGEMENT OFFICER – KWALE SMALL GRANTS FACILI

Add to Reading List

Source URL: www.environment.go.ke

Language: English - Date: 2015-08-13 01:29:41
455Information technology management / Information technology governance / Information technology / Privacy / Information technology audit / Computing / COBIT / Data security / ISACA / Information security / Business process management / Val IT

Cybersecurity Forum August 19, 2015 COBIT 5 Lets Play 50 Questions (more or less)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2015-08-19 23:26:10
456Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
457Security / Law enforcement / Prevention / Universities and colleges / Clery Act / Murder of Jeanne Clery / Safety escort service / Campus police / Security guard / Residence life / Emergency management in American universities

Microsoft Word - clery-report.docx

Add to Reading List

Source URL: www.witcc.edu

Language: English - Date: 2016-07-12 09:51:08
458Economy / Finance / Money / Security / Asset / Asset management / Management accounting / Valuation / Resilience / Modern portfolio theory / Sustainability

Day 1 synthesis Cities and the Economy Asset Management Fibre optic sensing solutions

Add to Reading List

Source URL: www.icsic.eng.cam.ac.uk

Language: English
459Emergency management / Engineering / Safety / Business continuity / Civil defense / National security / Resilience / Security / American Society of Civil Engineers / Psychological resilience / Journal of Structural Engineering / Community resilience

  CALL FOR PAPERS ASCE Journal of Structural Engineering Special Issue Structural Design and Robustness for Community

Add to Reading List

Source URL: resilience.colostate.edu

Language: English - Date: 2016-05-06 01:53:26
460Computer access control / Identity management / Computing / Computer security / Federated identity / Software requirements / TERENA / Security Assertion Markup Language / EduGAIN / GANT / Identity provider / GARR

Deliverable DNA2.1: Report on the identification of target groups and their requirements

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
UPDATE