Computer security policy

Results: 3514



#Item
541Public safety / National security / Crime prevention / Information security / Security controls / Physical security / Federal Information Security Management Act / Information technology audit / Information security management system / Security / Computer security / Data security

Policy Number (A155) University-wide Policy Information Security Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
542Security / Intellectual property law / Secrecy / Cyberwarfare / Economic Espionage Act / Industrial espionage / Espionage / Special 301 Report / Computer security / Ethics / Trade secrets / Business

Microsoft Word - TABD Trade Secrets Policy Recommendations Dec

Add to Reading List

Source URL: www.transatlanticbusiness.org

Language: English - Date: 2014-09-22 16:12:01
543Software testing / Computer network security / Industrial automation / SCADA / Telemetry / Vulnerability / Metasploit Project / Security / Computer security / Cyberwarfare / Technology

      CRITICAL  INFRASTRUCTURE  AND  COMPUTER  SECURITY:   Incentives  and  Policy  in  the  Internet  Era  

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2014-08-10 09:48:27
544Security controls / Cyberwarfare / Security / Computing / Computer security / Computer network security / Data security

U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Security Control Mapping of CJIS Security Policy Version 5.3 Requirements to

Add to Reading List

Source URL: www.fbi.gov

Language: English
545Cryptography / Cyberwarfare / SiteKey / Password cracking / Password policy / Password / Security / Computer security

PDF Document

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-11-18 20:31:41
546Wireless networking / Technology / FIPS 140 / Electronic engineering / Wireless access point / Wireless LAN / Computer network security / Cryptography standards / Computing / Aruba Networks

Dell W-IAP3WN, W-IAP3WNP, W-IAP108, W-IAP109, W-AP114, and W-AP115 Wireless Access Points with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSJanuary 26, 2015 This is to advise that the Aruba Networks

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-25 14:29:21
547Security / Security engineering / Critical infrastructure protection / Cyberwarfare / Critical infrastructure / Computer security / PDD-62 / National Cyber Security Division / National security / United States Department of Homeland Security / Infrastructure

WHITE PAPER The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
548Computing / Information security / Authorization / Password / Access control / Internet privacy / Superuser / Federal Information Security Management Act / Health Insurance Portability and Accountability Act / Computer security / Security / Public safety

Policy Number (A130) University-wide Policy Access Control and User Account Management Policy Date Approved:

Add to Reading List

Source URL: umshare.miami.edu

Language: English
549Public safety / Crime prevention / Information security / National security / Prevention / Policy / ISO/IEC 27002 / IT risk management / Data security / Security / Computer security

Microsoft Word - TheTotalCostofPolicyManagement.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:55
550Law / Privacy / Security / Data Protection Act / Information security / Information privacy / Geographic information system / Data protection (privacy) laws in Russia / Bundesdatenschutzgesetz / Data privacy / Privacy law / Computer law

NetSecrets Ltd Data Protection Policy February.

Add to Reading List

Source URL: www.maintenancesoftware.co.uk

Language: English - Date: 2015-03-12 14:44:14
UPDATE