CSRC

Results: 4036



#Item
381Computer network security / Crime prevention / National security / Electronic commerce / Pretty Good Privacy / Computer emergency response team / Internet security / Vulnerability / Incident management / Computer security / Security / Cyberwarfare

Incident Reporting Criteria and Rationale I. What type of activity should I report? What type of activity you should report, and the level of detail included in your report, depends on to whom you are reporting. Your loc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
382Federal Information Security Management Act / Security Content Automation Protocol / Cyberwarfare / National Institute of Standards and Technology / FIPS 140 / Federal Desktop Core Configuration / Extensible Configuration Checklist Description Format / NIST Special Publication 800-53 / Computer security / Computing / Security

FDCC/USGCB  2006 – 2014 Federal Desktop Core Configuration & United States Govt. Configuration Baseline  What is FDCC/USGCB? OMB initiative to provide mandatory/uniform configurations for commonly used operating

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-12 09:45:32
383Data security / Public safety / Prevention / Information security / Security awareness / General contractor / Office of Foreign Disaster Assistance / Computer security / Security / United States Agency for International Development

TAC 7-3a Information Assurance and Protection Performance Work Statement Information Assurance and Protection

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
384Sanitization / United States Agency for International Development / Information security / Classified information / Security / Data security / National security

APPENDIX A Executive Overview and Briefings

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
385

INFORMATION SYSTEMS SECURITY TASK TEAM Permission to Sanitize a Workstation/Server

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2007-09-19 01:00:00
    386Risk management / Actuarial science / Computer security / Data security / Information security / Reliability engineering / Management / Risk / Security

    Federal Computer Security Program Managers’ Forum August 9, 2012 Electricity Subsector Cybersecurity Risk Management Process

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-08-21 15:28:08
    387Orthogonal array testing / Statistical hypothesis testing / All-pairs testing / Statistics / Design of experiments / Science

    Practical Applications of Combinatorial Testing Rick Kuhn National Institute of Standards and Technology Gaithersburg, MD

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-09-04 20:35:24
    388

    浙江华铁建筑安全科技股份有限公司 Zhejiang Huatie Construction Safety Science And Technology Co.,Ltd. (注册地址:杭州市江干区九盛路 9 号 A05 幢 4 层) 首次公开发行股票

    Add to Reading List

    Source URL: www.csrc.gov.cn

    Language: Chinese - Date: 2015-04-10 03:58:33
      389National security / Government procurement in the United States / United States administrative law / Central Intelligence Agency / International Traffic in Arms Regulations / National Security Agency / E-Government / Whistleblower protection in United States / Telecommuting / Security / Government / United States government secrecy

      RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON “LIMITED PERSONAL USE” OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2007-09-19 01:00:00
      390System administration / Computer security / Banyan VINES / Password / NTFS / User / Superuser / Windows Server / Network security / System software / Microsoft Windows / Computing

      DOC Document

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2007-09-19 01:00:00
      UPDATE