Security type system

Results: 291



#Item
21Administration / Public records / Data / Security / Records management / HP TRIM Records Management System / Information security / Policy / Records manager / Content management systems / Business / Information technology management

PLEASE TYPE POLICY TITLE HERE

Add to Reading List

Source URL: www.schn.health.nsw.gov.au

Language: English - Date: 2015-05-25 10:05:55
22Information technology management / Business / Finance / Information technology audit / Auditing / Statement on Auditing Standards No. 70: Service Organizations / Payment card industry / Payment Card Industry Data Security Standard / Document management system / Payment systems / Credit cards / Data privacy

DataBank National Document Management Company Receives SAS 70 Type II Certification RMS International awards DataBank IMX an unqualified opinion for securing and protecting client documentation during the conversion of d

Add to Reading List

Source URL: databankimx.web12.hubspot.com

Language: English - Date: 2012-08-02 14:50:13
23Data / Cryptographic protocols / Network architecture / Crypto-anarchism / Internet privacy / Virtual private network / IPsec / Password / Profile configuration file / Computer network security / Computing / Tunneling protocols

Manually Setting up CarletonIntranetVPN with MAC 1. Open up System Preferences and select ‘Network’ 2. Under Network Preferences, click on the “+” icon 3. Select the Interface as “VPN”, the VPN Type as “Cis

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
24Network architecture / Computer architecture / Internet privacy / Internet protocols / Virtual private network / IPsec / Password / Profile configuration file / UT-VPN / Computer network security / Computing / Tunneling protocols

Manually Setting up Carleton VPN with MAC 1. Open up System Preferences and select ‘Network’ 2. Under Network Preferences, click on the “+” icon 3. Select the Interface as “VPN”, the VPN Type as “Cisco IPSe

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2013-07-02 08:14:11
25Carrier-based aircraft / VTOL aircraft / Military terminology / Signals intelligence / Unmanned aerial vehicle / Radar / Automatic dependent surveillance-broadcast / Joint Electronics Type Designation System / Harrier Jump Jet / Security / Aviation / Safety

PDF Document

Add to Reading List

Source URL: www.detect-inc.com

Language: English - Date: 2015-04-08 03:41:03
26Military science / Military / United States / International Traffic in Arms Regulations / United States Department of Defense / United States Foreign Military Financing / Joint Electronics Type Designation System / Foreign Military Sales / Military industry / Defense Security Cooperation Agency

Chapter 6 Types of LOAs Introduction

Add to Reading List

Source URL: www.disam.dsca.mil

Language: English - Date: 2015-05-05 13:59:19
27Høvik / Det Norske Veritas / Quality management / Bærum

DET NORSKE VERITAS TYPE APPROVAL CERTIFICATE CERTIFICATE NO. AThis is to certify that the Ship Security Alert System (SSAS) with type designation(s)

Add to Reading List

Source URL: web-assets-test5.s3.amazonaws.com

Language: English - Date: 2013-01-28 10:46:12
28Computing / Internet protocols / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / NLnet / Unbound / NSD / Internet / Domain name system / Network architecture

Annual Report 2009 Colophon This document was prepared with the OpenOffce and NeoOffce software using the OASIS open document type. Typeface: Helvetica Neue and Gill Sans.

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-06-02 04:40:52
29Product certification / Radio-frequency identification / Alarms / Car alarm / World Forum for Harmonization of Vehicle Regulations / Immobiliser / Key / Type approval / Vehicle / Security / Safety / Transport

38th Asia Expert Meeting 2014 on UN/ECE Regulation for R18 PROTECTION AGAINST UNAUTHORIZED USE (LOCKING SYSTEM) R62 PROTECTION AGAINST UNAUTHORIZED USE (MOTOR CYCLE) R97 VEHICLE ALARM SYSTEMS R116 PROTECTION AGAINST UNAU

Add to Reading List

Source URL: www.jasic.org

Language: English - Date: 2015-01-07 00:25:36
30Internet / Electronic commerce / Secure communication / Transport Layer Security / Server / Transparent Data Encryption / Encrypting File System / I2P / Computing / Software / Internet standards

Client Accessible Encrypted Server Storage By combining SSL and Transparent Data Encryption technologies into client-server type architecture we are able to create an encrypted data storage and messaging solution. Simpli

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:37:51
UPDATE