Security management

Results: 59084



#Item
901Security / Identity management / Crime prevention / Cryptography / Information governance / National security / Prevention / Privacy / Internet privacy / Computer security

GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2009-07-15 10:58:06
902Health / Economy / Medicine / Human reproduction / Polycystic ovary syndrome / RTT / Syndromes / Clinical trial / Insurance / Risk management

Safety & Security document

Add to Reading List

Source URL: www.iapco.org

Language: English - Date: 2013-09-12 11:15:21
903Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Electronic documents / SAFE-BioPharma Association / Certificate authority / Digital signature / Public key certificate / Professional certification

TeleTrusT – Bundesverband IT-Sicherheit e.V. Der IT-Sicherheitsverband. PRESS RELEASE Transatlantic Alliance:

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-05-23 10:15:15
904Prevention / Business continuity and disaster recovery / Safety / Emergency management / Security / National security / IT risk management / Management / Resilience / Business continuity / Crisis management / Risk management

New Solutions for Resiliency and Risk Management Visit Us: www.drj.com/fallworld

Add to Reading List

Source URL: www.drj.com

Language: English
905Security / Computing / Computer security / Computer network security / Cryptography / Cyberwarfare / National security / Secure communication / Layered security / Mobile device management / Mobile workspace

Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-07-16 06:38:47
906Taxation in Australia / Data security / Identity management / Law / Privacy / Freedom of information laws by country / Australian Company Number / Internet privacy / Australian Business Number / Email / Information privacy / Government

Corporate Application for a pre-design/pre-lodgement meeting OFFICIAL USE ONLY DATE RECEIVED

Add to Reading List

Source URL: www.ehp.qld.gov.au

Language: English - Date: 2016-08-01 01:42:50
907Computer access control / Computer security / Cryptography / Identity management systems / Self-service password reset / Password / Authentication / One-time password / The Button / Login / Password fatigue / Password strength

TABLE OF CONTENTS Getting Started ~ Activation Process............................................................................... 1 Enrollment Process..................................................................

Add to Reading List

Source URL: its.com.edu

Language: English - Date: 2015-10-02 12:31:25
908Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Energy Sciences Network / Authentication

Microsoft Word - CP-CPS-V24-TG-18may04-do.doc

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-05-24 17:28:01
909Risk / Auditing / Actuarial science / Prevention / Safety / Risk management / Security / Internal control / IT risk management / Enterprise risk management

Internal control and Risk Management Framework: Volume II / Internal Control and Risk Management Framework (ICRM) Project

Add to Reading List

Source URL: darpg.gov.in

Language: English - Date: 2016-03-23 01:40:48
910Actuarial science / Disaster preparedness / Prevention / Safety / Security / Financial risk / Probability / Risk / Committee on Data for Science and Technology / Emergency management / Economy

Risk Models and Applications International Interdisciplinary CODATA Workshop Berlin, Germany, August 26/27, 2010 http://www.codata-germany.org/RMA_2010

Add to Reading List

Source URL: www.codata-germany.org

Language: English - Date: 2010-04-14 09:46:53
UPDATE