Computer security policy

Results: 3514



#Item
291Security Technical Implementation Guide / Defense Information Systems Agency / Videotelephony / Videoconferencing / Information technology management / Technology / Computer security / Security / Configuration management

UNCLASSIFIED VIDEO SERVICES POLICY SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW

Add to Reading List

Source URL: www.freeporttech.com

Language: English - Date: 2015-03-31 15:07:35
292Technology / Digital media / American Association of State Colleges and Universities / North Central Association of Colleges and Schools / University of Arkansas at Monticello / Computer network / Authorization / Internet / Computer security / Security / Crime prevention / National security

Computer Usage Policy Introduction The University provides an opportunity for students and other members of the UAM community to enhance their educational experiences and expand their academic knowledge by making availab

Add to Reading List

Source URL: uam-web2.uamont.edu

Language: English - Date: 2015-03-18 09:33:01
293Software release life cycle / Computing / Technology / Electronics / Computer network security / Content-control software / Fortinet

Fortinet Product Life Cycle Information Fortinet suggests that customers familiarize themselves with the Fortinet Product Life Cycle Policy . Particularly important to Fortinet customers are the three product life cycle

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:09
294Computing / Crime prevention / National security / Computer network security / Information technology management / Cloud computing / Application security / Data security / Payment Card Industry Data Security Standard / Security / Computer security / Electronic commerce

  Security Policy LearnSprout Products & Services  

Add to Reading List

Source URL: learnsprout-static.s3.amazonaws.com

Language: English - Date: 2014-12-23 18:35:24
295Electronics / Computer network security / Spamming / Intranet / Acceptable use policy / Extranet / Spam / Computing / Internet / Email

Heritage Christian University Student Information Technology Acceptable Use Policy 1.0 Overview: The IT Department is committed to protecting Heritage Christian University’s employees, students, par

Add to Reading List

Source URL: www.hcu.edu

Language: English - Date: 2014-03-13 17:59:19
296Streaming / Computer network security / Network architecture / Electronic engineering / Deep packet inspection / Policy charging and rules function / Traffic shaping / Quality of service / Traffic flow / Computing / Telecommunications engineering / Network performance

Application Note Intel® Architecture Processors Qosmos* DPI Technology Policy Enforcement in SDN and NFV- based Telco Infrastructure

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:29
297Network architecture / Electronics / Quality of service / Network intelligence / System Architecture Evolution / Network processor / Continuous Computing / Deep packet inspection / Computer network security / Computing

Product Brief Qosmos ixEngine®: Policy Control and Charging (PCC) Use Case For developers of telecom equipment who want to build products to handle the growth of mobile data traffic, provide

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:08
298Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
299Password / Phishing / Two-factor authentication / Password strength / Password policy / Security / Access control / Computer security

Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter). People make mistak

Add to Reading List

Source URL: rebootpeterborough.ca

Language: English - Date: 2013-04-28 04:02:58
300Computer security / Federal Information Security Management Act / United States House Committee on Oversight and Government Reform / Politics of the United States / Mark Souder / William Lacy Clay /  Jr. / Office of Management and Budget / Certification and Accreditation / Eleanor Holmes Norton / Computer law / Evaluation / Government

FEDERAL IT SECURITY: THE FUTURE OF FISMA JOINT HEARING BEFORE THE SUBCOMMITTEE ON INFORMATION POLICY,

Add to Reading List

Source URL: house.resource.org

Language: English - Date: 2011-02-09 15:30:02
UPDATE