dcsimg
 

IT Downloads Results for Topic : Governance - Page 2

All
All
 
 
Showing 11-20 of 57 Results    
 
 

Approximate Matching: Definition and Terminology

  ITDownload  
  |   RESEARCH   |   Jul 10, 2014
 

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

...  More >>

 

'Data Governance: Creating Value from Information Assets' Excerpt

  ITDownload  
  |   BOOK EXCERPTS   |   Jul 23, 2013
 

Addressing the complete life cycle of effective data governance — from metadata management to privacy and compliance — this book provides business managers, IT professionals and students with an integrated approach to designing, developing and sustaining an effective data governance strategy.

...  More >>

 

A Credential Reliability and Revocation Model for Federated Identities

  ITDownload  
  |   TUTORIALS   |   Jul 11, 2013
 

In the absence of a uniform revocation method, this document seeks to investigate credential and attribute revocation with a particular focus on identifying missing requirements.

...  More >>

 
Tutorial

Supply Chain Risk Management Practices for Federal Information Systems

  ITDownload  
  |   SUPPLY CHAIN MANAGEMENT   |   Jan 28, 2013
 

This document seeks to equip federal departments and agencies with a notional set of repeatable and commercially reasonable supply chain assurance methods and risk management practices.

...  More >>

 
Blogging and Microblogging Guidelines Template

Blogging and Microblogging Guidelines Template

  ITDownload  
  |   TEMPLATES   |   May 21, 2012
 

Use this template to set employee expectations and establish guidelines for appropriate engagement in social conversations outside the company....  More >>

 
Cloud Computing Reference Architecture

Cloud Computing Reference Architecture

  ITDownload  
  |   TUTORIALS   |   May 17, 2012
 

Cloud Computing Reference Architecture accurately communicates the components and offerings of cloud computing.

...  More >>

 
BYOC Readiness Assessment Tool

BYOC Readiness Assessment Tool

  ITDownload  
  |   TUTORIALS   |   May 10, 2012
 

Successful deployment of each BYOC model depends on a different mix of capabilities.

...  More >>

 
Eleven Reasons IT Projects Fail

Eleven Reasons IT Projects Fail

  ITDownload  
  |   RESEARCH   |   Feb 27, 2012
 

IT Business Edge compiled this list of early warning signs to help yourecognize and address project problems before catastrophic failure occurs....  More >>

 
Computer Forensics Overview

Computer Forensics Overview

  ITDownload  
  |   TUTORIALS   |   Feb 22, 2012
 

Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques....  More >>

 
BYOC Strategy Position Template

BYOC Strategy Position Template

  ITDownload  
  |   TEMPLATES   |   Feb 10, 2012
 

Is a "bring-your-own-computer" program possible in your business? Create a strategy position document to weigh the pros and cons....  More >>

 
 
 
Pages:   « Prev1 | 2 34Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.