Security management

Results: 59084



#Item
941Cryptography / International Electrotechnical Commission / Standards organizations / BSI Group / Kitemark / Public key certificate / Identity document

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Þjóðskrá Íslands (Registers Iceland)

Add to Reading List

Source URL: www.skra.is

Language: English - Date: 2015-12-11 09:47:50
942Security / Prevention / Safety / Computer security / National security / Crime prevention / Cryptography / Information security / Insurance / Threat / Risk management / Risk

WHITE PAPER Cyber Security Services For Cyber Security, What Determines the Price Tag? Where to Start

Add to Reading List

Source URL: www.tanagerinc.com

Language: English - Date: 2016-06-27 12:47:44
943Computing / Data management / Data security / Information technology / Cloud infrastructure / Big data / Technology forecasting / Transaction processing / Internet privacy / Data quality / Personally identifiable information / Cloud computing

Ethical Market Models in the Personal Data Ecosystem Kaliya “Identity Woman” Personal Data Ecosystem Consortium ABSTRACT

Add to Reading List

Source URL: deviw.evelurie.net

Language: English - Date: 2016-04-07 21:09:36
944Business / Economy / Supply chain management / Arrow Electronics / Crime prevention / Cryptography / Information governance / National security / Asset recovery / Electronic waste / Supply chain / Sustainability

Value Recovery arrow.com Value Recovery With Arrow Value

Add to Reading List

Source URL: www.fiveyearsout.com

Language: English - Date: 2016-08-12 12:28:45
945Actuarial science / Economy / Business / Risk / Finance / Project management / Disaster preparedness / Security / Disaster risk reduction / Aon / Insurance

Resilience through the Management of Societal & Economic Risk Understanding Risk: Lunchtime Seminar Series Monday 21 October 2013 at 12:30pm Seminar Room 2.02, Judge Business School, Trumpington St., Cambridge CB2 1AG

Add to Reading List

Source URL: www.risk.jbs.cam.ac.uk

Language: English - Date: 2013-10-04 12:40:00
946Microsoft / Digital media / Video / Software / Security / Video management system / Pantiltzoom camera / Workspace / Outlook.com / User interface / IPhone / IP camera

Operator Manual - A Guide to the Matrix Screens

Add to Reading List

Source URL: www.videonext.com

Language: English - Date: 2011-09-12 22:26:31
947Computer access control / Computer security / Federated identity / Identity management / Cloud standards / OpenID / Authentication / Single sign-on / Identity provider / Password / Information Card / OAuth

An Investigation into a Usable Identity Binding Service Tristan Lewis William Kim Jill L. Drury

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:32
948Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Computer security / Professional certification / ISO/IEC 27001:2005

ISOProvides Cyber Security Management for Legal Organizations I

Add to Reading List

Source URL: www.pjr.com

Language: English - Date: 2015-12-17 09:42:37
949Geography of Texas / Chief information security officer / Woodforest National Bank / Senior management / Think tank / CIO magazine / Houston / Business

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-05-23 13:31:12
950Computer access control / Computer security / Cryptography / Security / Password / Login / Authentication / Identity management

Unit 1:Orientation to SAMS

Add to Reading List

Source URL: stateaid.nysed.gov

Language: English - Date: 2015-09-08 15:10:19
UPDATE