Computer Security Institute

Results: 1676



#Item
981Computing / Privacy / National Institute of Standards and Technology / Information security / Personally identifiable information / Security controls / Internet privacy / Privacy policy / Telecommunications data retention / Computer security / Security / Data security

DATA PRIVACY SAFEGUARD PROGRAM INFORMATION SECURITY AND PRIVACY BEST PRACTICES Information Security and Privacy Best Practices for organizations with access to personally identifiable information (PII) Information Securi

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2013-09-06 11:44:56
982Committee on National Security Systems / Security risk / FIPS 140-2 / Security controls / Information security / National Institute of Standards and Technology / Wireless security / National Information Assurance Glossary / Countermeasure / Computer security / Security / Cyberwarfare

Committee on National Security Systems CNSSP No. 17 January[removed]POLICY

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-08-01 09:43:54
983Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
984Linear algebra / Technical communication / Vectors / Computer security / CVSS / Euclidean vector / Vulnerability / XML / Vector space / Algebra / Mathematics / Abstract algebra

XCCDF Developer Day Workshop February 23, 2010 Introduction This document contains a summary of the discussions and consensus decisions from the February 23 XCCDF Developer Day Workshop held at the National Institute of

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2010-03-11 07:42:54
985Standards organizations / National Institute of Standards and Technology / Computing / Telecommunications Industry Association / NIST Special Publication 800-53 / American National Standards Institute / Security controls / Federal Information Security Management Act / Federal Information Processing Standard / Computer security / Security / Data security

April 6, 2012 Via Electronic Filing National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop[removed]Gaithersburg, MD[removed]

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2012-04-06 15:27:33
986Government / National Institute of Standards and Technology / Ethics / Computer law / Federal Information Security Management Act / Privacy law / NIST Special Publication 800-53 / OMB Circular A-130 / Personally identifiable information / Security / Computer security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]DEPUTY DIRECTOR FOR MANAGEMENT

Add to Reading List

Source URL: www.indianaffairs.gov.

Language: English - Date: 2014-07-01 04:58:50
987Cyberwarfare / American Lebanese Syrian Associated Charities / War / Military science / Security / Computer security / National Cyber Security Awareness Month / United States Department of Homeland Security

On October 15, 2010, the University of Memphis Center for Information Assurance (CfIA) hosted the 3rd Annual Cyber Security Expo at the beautiful U of M FedEx Institute of Technology (FIT). The focus this year was Online

Add to Reading List

Source URL: cfia.memphis.edu

Language: English - Date: 2010-10-28 16:04:32
988Ethology / Systems theory / Laboratories / Massachusetts Institute of Technology / System / Systems science / Computer security / Computer science / Operating system / Science / Cybernetics / Knowledge

C O M P U T E R L A B O R AT O RY UNIVERSITY OF CAMBRIDGE Leaders in Computing Research and Teaching William Gates Building JJ Thomson Avenue

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-01-31 13:20:27
989Software testing / Computer network security / Hacking / National security / Vulnerability / Security engineering / Threat model / Application security / Software quality / Computer security / Security / Cyberwarfare

DIMACS Research and Education Institute (DREI): DREI'98 Report

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-04-19 09:24:31
990Government / National Institute of Standards and Technology / United States government secrecy / Data security / FIPS 201 / E-Authentication / Personally identifiable information / OMB Circular A-130 / Federal Information Security Management Act / Security / Computer security / National security

MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Add to Reading List

Source URL: georgewbush-whitehouse.archives.gov

Language: English - Date: 2005-08-10 14:08:08
UPDATE