Security management

Results: 59084



#Item
921Water / Physical geography / Hydrology / Federal Emergency Management Agency / Flood control / Flood / National Flood Insurance Program / United States Department of Homeland Security / Floodplain / Special Flood Hazard Area / Flood insurance / Flood mitigation

CUSTER COUNTY ORDINANCE #6 REVISED FLOOD DAMAGE PREVENTION ORDINANCE SECTION 1.0 STATUTORY AUTHORIZATION, FINDINGS OF FACT, PURPOSE AND OBJECTIVES 1.1

Add to Reading List

Source URL: www.sdcounties.org

Language: English - Date: 2011-01-28 14:40:27
922Computing / Computer networking / Computer network security / Network architecture / Network management / Local area networks / Open vSwitch / Software-defined networking / Traffic flow / Firewall / Load balancing / NetFlow

Virtual Network Diagnosis as a Service Wenfei Wu, Guohui Wang, Aditya Akella, Anees Shaikh Abstract Today’s cloud network platforms allow tenants to construct sophisticated virtual network topologies among their VMs on

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2013-10-01 17:21:19
923Computing / Computer access control / Computer security / Cloud standards / Federated identity / Identity management / User-Managed Access / OAuth / OpenAM / Cloud computing / Authorization / Internet privacy

USER-MANAGED ACCESS DATASHEET ForgeRock Identity Platform: User-Managed Access User-controlled data sharing for privacy and trust

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-01-27 00:48:20
924Security / Prevention / Surveillance / Safety / Video / Physical security / Network video recorder / NVR / IP camera / Video management system / Closed-circuit television / IQinVision

Megapixel NVRs Meet Market Demands Surveon offers a full line of network video recorders in different segments (Professional, Enterprise, and Corporate) to meet various market demands. All appliances are designed and man

Add to Reading List

Source URL: www.surveon.com

Language: English - Date: 2015-08-03 05:51:02
925Cryptography / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Certificate authority / IdenTrust / Root certificate / Public key certificate / Authentication

IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
926Security / Human resource management / Labor history / Labor rights / Labour relations / Prevention / Employment compensation / Weeks / Workweek and weekend / Security guard / Hour / Overtime

equipment & services rates The Department offers an Incentive Rate to Show Management on equipment and services when complete event requirements or specifications are received thirty-one (31) days or more from the first

Add to Reading List

Source URL: www.austinconventioncenter.com

Language: English - Date: 2016-01-20 12:13:14
927Finance / Money / Economy / Investment / Financial services / Funds / Investment fund / Accredited investor / Investment management / Security / Mutual fund / Hedge fund

Phillip Global Opportunities Funds - Global Opportunities Fund Prospectus Dated 25 September 2015

Add to Reading List

Source URL: phillipfunds.com

Language: English - Date: 2015-10-15 01:41:02
928Management / Economy / Actuarial science / Business / Security / Prevention / Auditing / Enterprise risk management / Information technology audit / Strategic management / Risk management / Governance

PIDM Logo Horizontal (Eng) Oren BG

Add to Reading List

Source URL: pidm.gov.my

Language: English - Date: 2014-11-25 08:04:56
929Employment compensation / Human resource management / Leave / Economy / Labor / Health care / Sick leave / Social security / Accrual / Payroll / Holidays Act

Request for Grant from Sick Leave Fund

Add to Reading List

Source URL: benefits.mt.gov

Language: English - Date: 2014-10-29 11:48:18
930Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Electronic health record / Computer security / Health Insurance Portability and Accountability Act / Mobile device management / Information privacy / Mobile app

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
UPDATE