Computer Security Institute

Results: 1676



#Item
611National Institute of Standards and Technology / Identity / Dixie / American songs / Vocal music / Sociology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

HIT Standards Committee Transport & Security Standards Workgroup Transcript November 5, 2014

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-17 10:55:16
612Computer security / Data security / Security / National Institute of Standards and Technology / Information security / Open Data Center Alliance / Cloud computing / Centralized computing / Computing

NIST US Government Cloud Computing Technology Roadmap

Add to Reading List

Source URL: collaborate.nist.gov

Language: English - Date: 2011-11-01 07:39:51
613Framework Programmes for Research and Technological Development / Smart grid / Wireless sensor network / Ambient intelligence / Computer security / Infrastructure / Geographic information system / Technology / Cyber-physical system / Security

NSF-IUSSTF Workshop on Distributed Infrastructure for Security Monitoring and Intelligence Extraction Indian Institute of Science, Bangalore 9-13 January 2010 Dr. Timothy Finin Computer Science and Electrical Engineering

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2012-01-06 15:48:32
614Federal Information Security Management Act / Data security / National Institute of Standards and Technology / United States Office of Management and Budget / Evaluation / Computing / Standards for Security Categorization of Federal Information and Information Systems / Certification and Accreditation / Information security / Computer security / Security / Computer law

Memorandum to Heads of Executive Departments and Agencies

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2009-08-21 10:07:42
615Public safety / Information technology management / Computer network security / Security controls / COBIT / National Institute of Standards and Technology / Information security / Regulatory compliance / Vulnerability / Computer security / Data security / Security

Staff Guidance on Current SCI Industry Standards

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2014-11-19 13:14:13
616National Institute of Standards and Technology / Identity / Dixie / American songs / Vocal music / Sociology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

HIT Standards Committee Transport & Security Standards Workgroup Transcript November 5, 2014

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-11-17 10:55:16
617National security / Data security / Computing / National Institute of Standards and Technology / Federal Information Security Management Act / NIST Special Publication 800-53 / Controlled Unclassified Information / Information security / Information Security Oversight Office / Computer security / Security / United States government secrecy

DRAFT Special Publication[removed], Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-11-18 07:00:20
618Public safety / Prevention / Crime prevention / Information security / National security / Security policy / Oregon Institute of Technology / Bobby Jindal / Security / Data security / Computer security

BOBBY JINDAL ANGELE DAVIS GOVERNOR

Add to Reading List

Source URL: www.doa.louisiana.gov

Language: English - Date: 2009-09-21 12:45:24
619Computing / NIST Special Publication 800-53 / National Institute of Standards and Technology / Information security / Cyber security standards / Control system security / Computer security / Security / Data security

Microsoft PowerPoint - Ross_NIST_Special_Publication.pptx

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-05 13:53:57
620Twilio / Subscriber identity module / Security token / Computer security / Representational state transfer / Access token / Application programming interface / Computing / Security / Cloud computing

VIRTUAL SIMs THE FUTURE OF TELEPHONY AS A SERVICE TATENDA TRUST GOTORA HARARE INSTITUTE OF TECHNOLOGY

Add to Reading List

Source URL: www.ubuntunet.net

Language: English - Date: 2014-11-21 11:14:54
UPDATE