System integrity

Results: 1213



#Item
321Prevention / TÜV Rheinland / Technischer Überwachungsverein / Functional Safety / Safety Integrity Level / IEC 61511 / Safety instrumented system / Safety / Risk / Security

Functional Safety Brochure long version Approved.pub

Add to Reading List

Source URL: www.iica.org.au

Language: English - Date: 2014-12-10 18:50:09
322Technology systems / Technology / Information systems / Ais people / Accounting information system / User / System integrity / Geography of Florida / Telecommunications / Florida

AIS Newsletter Spring/Summer 2014 President’s Letter 2014 AAA Annual Meeting 2015 AIS Section Midyear

Add to Reading List

Source URL: www2.aaahq.org

Language: English - Date: 2014-05-18 01:03:44
323Risk management / Actuarial science / Security / International taxation / Transfer pricing / Regulatory risk differentiation / Risk / Management / Ethics

Braithwaite META RISK MANAGEMENT 1 Meta Risk Management and Responsive Regulation for Tax System Integrity*

Add to Reading List

Source URL: www.anu.edu.au

Language: English - Date: 2006-09-04 03:39:30
324Serco Group / Data management / Document management system / Data integrity / SMS / Information technology management / Technology / Mobile technology

Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that

Add to Reading List

Source URL: www.serco.com

Language: English - Date: 2015-03-25 10:52:40
325Law / Parliamentary privilege / Parliament of Singapore / Parliament of the United Kingdom / Pepper v Hart / Hansard / Police Integrity Commission / Statutory Instrument / House of Commons of the United Kingdom / Westminster system / Government / Politics

18 -GONYE EXCLUSIVE COGINISENCE FINAL ed

Add to Reading List

Source URL: www.aspg.org.au

Language: English - Date: 2015-02-03 05:11:55
326Prevention / IEC 61508 / Safety Integrity Level / ThreadX / IEC 61511 / Embedded system / Software development process / DO-178B / Life-critical system / Safety / Technology / Security

ESC 2010 Product Brief Regulatory Standards for Safety-Critical Embedded Systems By John A. Carbone

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2010-09-14 12:55:06
327System software / Malware / Sandbox / Application security / Mandatory Integrity Control / Mandatory access control / Internet security / Windows Vista / Spyware / Computer network security / Computer security / Security

State of the Art of Application Restrictions and Sandboxes

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2013-02-05 23:03:43
328Kernel / Operating system kernels / Microkernel / Ring / Hypervisor / Hyper-V / Integrity / Exokernel / VM / System software / Computer architecture / Software

Verified secure kernels and hypervisors for the Cloud Matthieu Lemerre Nikolai Kosmatov

Add to Reading List

Source URL: kosmatov.perso.sfr.fr

Language: English
329Cyberwarfare / Crime prevention / National security / Information security / Security controls / Security risk / Vulnerability / Information security management system / Federal Information Security Management Act / Security / Computer security / Data security

Maintaining the Integrity and Confidentiality of Personal Information Audit summary Background The public sector is a complex business. In its normal, day-to-day activity it legitimately gathers and uses personal informa

Add to Reading List

Source URL: www.audit.vic.gov.au

Language: English - Date: 2013-07-11 19:57:49
330Privacy / Dow Jones Industrial Average / IBM / Corporate social responsibility / Chief privacy officer / Corporate governance / Internet privacy / Governance / Hewlett-Packard / Computing / Ethics / Technology

2012 Corporate Responsibility Report ibm.com/ibm/responsibility/2012 Governance IBM’s culture of ethics and integrity is guided by a rigorous system of corporate governance. In this section, you will find examples of

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2013-07-31 10:03:14
UPDATE