Security paper

Results: 6621



#Item
351Information technology management / Content management systems / Administration / Public records / Information governance / Records management / Electronic discovery / Legal hold / Enterprise content management / Information security / Compliance and ethics program / Regulatory compliance

White Paper The Information Governance “C” Change Swamped by overflowing data and buffeted by e-discovery costs and information security requirements, companies are now compelled to make information management a

Add to Reading List

Source URL: www.huschblackwell.com

Language: English - Date: 2016-01-07 13:02:51
352

TheISC)2 Global Information Security Workforce Study A Frost & Sullivan White Paper A Frost & Sullivan Market Study in Partnership with:

Add to Reading List

Source URL: files.ctctcdn.com

- Date: 2015-05-26 18:51:36
    353

    Social security provision and the self-employed: Occasional Paper 13

    Add to Reading List

    Source URL: www.gov.uk

    Language: English - Date: 2014-09-25 04:58:10
      354

      Position paper Reference Points for the Eastern Partnership Security Agenda Hennadiy Maksak On 5 March 2015, the High Representative of the Union for Foreign Affairs and Security Policy Federica Mogherini together with t

      Add to Reading List

      Source URL: eap-csf.eu

      Language: English - Date: 2015-06-30 15:19:06
        355

        Enabling Comprehensive Security with VSS vBroker with Active Protection White Paper © Copyright 2003 – 2014. VSS Monitoring Inc. All rights reserved.

        Add to Reading List

        Source URL: www.vssmonitoring.com

        Language: English - Date: 2016-02-26 19:43:42
          356

          10 Years of the Right to Adequate Food Guidelines Progress, Obstacles and the Way Ahead Civil Society Synthesis Paper for the 41st Session of the UN Committee on World Food Security

          Add to Reading List

          Source URL: fifcj-ifwlc.com

          Language: English - Date: 2015-05-21 22:03:12
            357Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

            BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2010-12-16 18:40:43
            358

            This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure

            Add to Reading List

            Source URL: www.netsec.ethz.ch

            Language: English - Date: 2015-06-01 09:06:13
              359

              SECURITY WHITE PAPER MicroStrategy Usher Enterprise security: tradeoffs, trends, and key dynamics.

              Add to Reading List

              Source URL: www.usher.com

              Language: English
                360

                Sponsored by Newest Data Center Dilemma: Security vs. Performance In This Paper

                Add to Reading List

                Source URL: i.crn.com

                Language: English - Date: 2015-02-11 17:25:15
                  UPDATE