IT Downloads Results for Topic : Governance - Page 2

All
All
 
 
Showing 11-20 of 57 Results    
 
 

Approximate Matching: Definition and Terminology

  ITDownload  
  |   RESEARCH   |   Jul 10, 2014
 

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

...  More >>

 

'Data Governance: Creating Value from Information Assets' Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Jul 23, 2013
 

Addressing the complete life cycle of effective data governance — from metadata management to privacy and compliance — this book provides business managers, IT professionals and students with an integrated approach to designing, developing and sustaining an effective data governance strategy.

...  More >>

 

A Credential Reliability and Revocation Model for Federated Identities

  ITDownload  
  |   TUTORIALS   |   Jul 11, 2013
 

In the absence of a uniform revocation method, this document seeks to investigate credential and attribute revocation with a particular focus on identifying missing requirements.

...  More >>

 
Tutorial

Supply Chain Risk Management Practices for Federal Information Systems

  ITDownload  
  |   SUPPLY CHAIN MANAGEMENT   |   Jan 28, 2013
 

This document seeks to equip federal departments and agencies with a notional set of repeatable and commercially reasonable supply chain assurance methods and risk management practices.

...  More >>

 
Blogging and Microblogging Guidelines Template

Blogging and Microblogging Guidelines Template

  ITDownload  
  |   TEMPLATES   |   May 21, 2012
 

Use this template to set employee expectations and establish guidelines for appropriate engagement in social conversations outside the company....  More >>

 
Cloud Computing Reference Architecture

Cloud Computing Reference Architecture

  ITDownload  
  |   TUTORIALS   |   May 17, 2012
 

Cloud Computing Reference Architecture accurately communicates the components and offerings of cloud computing.

...  More >>

 
BYOC Readiness Assessment Tool

BYOC Readiness Assessment Tool

  ITDownload  
  |   TUTORIALS   |   May 10, 2012
 

Successful deployment of each BYOC model depends on a different mix of capabilities.

...  More >>

 
Eleven Reasons IT Projects Fail

Eleven Reasons IT Projects Fail

  ITDownload  
  |   RESEARCH   |   Feb 27, 2012
 

IT Business Edge compiled this list of early warning signs to help yourecognize and address project problems before catastrophic failure occurs....  More >>

 
Computer Forensics Overview

Computer Forensics Overview

  ITDownload  
  |   TUTORIALS   |   Feb 22, 2012
 

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

 
BYOC Strategy Position Template

BYOC Strategy Position Template

  ITDownload  
  |   TEMPLATES   |   Feb 10, 2012
 

Is a "bring-your-own-computer" program possible in your business? Create a strategy position document to weigh the pros and cons....  More >>

 
 
 
Pages:   « Prev1 | 2 34Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.