Computer Security Institute

Results: 1676



#Item
781Computing / Academic publishing / Andrew W. Mellon Foundation / JSTOR / Password / X Window System / Open proxy / Massachusetts Institute of Technology / Software / Academia / Computer network security

From /OITHAKA/OUFIRST GROUF/CNRECIPIENTS/CN Sent

Add to Reading List

Source URL: docs.jstor.org

Language: English - Date: 2013-07-25 17:13:10
782National Institute of Standards and Technology / Payment card / Computer security / Cyberwarfare / Security / Computer network security / Standards organizations / National Strategy for Trusted Identities in Cyberspace

NSTIC Governance AND Objectives Views of Transaction Security, Inc. - Rod Beatson June 20, 2011 June 21, 2011 NSTIC Framework

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-06-20 11:35:40
783Computing / Information technology audit / Information security / National security / Security controls / ISO/IEC 27002 / Vulnerability / Information technology controls / Business continuity / Data security / Security / Computer security

SANS Institute BS ISO IEC[removed]Audit Checklist 22[removed]SANS Institute BS ISO IEC[removed]Audit Checklist 22[removed]

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:35
784Computer security / M. Eric Johnson / Data security / Dependability / Andrew Odlyzko / Tuck School of Business / Bruce Schneier / Institute for Information Infrastructure Protection / Information security / Security / Prevention / Safety

Preface Welcome to the Tuck School and Workshop on the Economics of Information Security. The Center for Digital Strategies at Tuck along with the I3P, based here at Dartmouth, are delighted to host WEIS this year. The 2

Add to Reading List

Source URL: weis2008.econinfosec.org

Language: English - Date: 2008-06-12 07:49:16
785ISO standards / Ubiquitous computing / Computer security / X.509 / PERMIS / Public key certificate / Smart card / Technology / Personal digital assistant / Public-key cryptography / Computing / Key management

Security Policy Management for Handheld Devices Wayne A. Jansen, Tom Karygiannis The National Institute of Standards and Technology, {Wayne.Jansen,Tom.Karygia

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
786National Institute of Standards and Technology / Computing / Risk analysis / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security controls / Federal Information Processing Standard / Asset / Computer security / Data security / Security

6264 Federal Register / Vol. 69, No[removed]Tuesday, February 10, [removed]Notices These deposit requirements shall remain in effect until publication of the

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 21:05:57
787Standards organizations / Computer security / American National Standards Institute / Steering / Information security / Public safety / Cyberwarfare / Computer network security / National Strategy for Trusted Identities in Cyberspace / Security

Microsoft Word - Transglobal SCP - NSTIC NOI[removed]docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-28 11:11:00
788Risk management / Risk / Data security / Risk management framework / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Telos / Security risk / National Institute of Standards and Technology / Computer security / Management / Security

The NIST Risk Management Framework Smooth your transition from DIACAP to the NIST RMF with Telos process experts and the Xacta® IA Manager solution for risk-management automation. Telos® Corporation is a federal market

Add to Reading List

Source URL: www.telos.com

Language: English - Date: 2014-06-23 09:56:51
789Computer network security / Tunneling protocols / Email / Worcester Polytechnic Institute / Microsoft Outlook / Password / Outlook Web App / Cisco Systems VPN Client / Shared resource / Computing / Calendaring software / Personal information managers

WORKING FROM OFF-CAMPUS: USING A WINDOWS COMPUTER CONNECTED TO HOME NETWORK Please consult the HOME NETWORK STANDARD for computer and data security information. http://www.wpi.edu/academics/CCC/Policies/homenet.html Acce

Add to Reading List

Source URL: www.wpi.edu

Language: English - Date: 2014-05-13 12:53:11
790Cyberwarfare / Computer network security / Acceptable use policy / Email / Etiquette / Internet culture / Threat / Internet / Computer security / Computing / Digital media

Southwestern Indian Polytechnic Institute Student Information Technology Use Policy Computer and Internet access is encouraged for all enrolled students to obtain information and assistance to further their education whi

Add to Reading List

Source URL: www.sipi.edu

Language: English - Date: 2011-08-31 18:00:04
UPDATE