Computer security policy

Results: 3514



#Item
551Security / Data security / Internet privacy / Information security / National security / Politics / Policy / Acceptable use policy / TRAC / Computer security / Information technology management / Computing

Microsoft Word - 5StepsToPolicyCompliance.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:15
552Evaluation / Computer security / ISO standards / Common Criteria / First-order logic / Mereology / Predicate logic / Mathematical logic / Logic

Formal Specifications of Security Policy Models Wolfgang Thumser T-Systems GEI GmbH ======! T§==Systems=

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:09
553Crime prevention / National security / Public safety / Computer network security / Information security / Caldicott Report / Asset / National Health Service / Security controls / Data security / Security / Computer security

NHS Cancer Screening Programmes Information Security Policy VERSION 3 JULY 2009

Add to Reading List

Source URL: www.cancerscreening.nhs.uk

Language: English - Date: 2009-11-30 11:30:47
554Software / Computer networking / Computer network security / Network management / Internet privacy / Proxy server / Windows / Network traffic measurement / Windows Vista networking technologies / Computing / System software / Windows Server

Policy.Net Enterprise TM Policy.Net Enterprise offers a comprehensive traffic management solution, with distributed endpoint policy enforcement and centralized policy definition. Policy.Net provides endpoint network secu

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:58
555Public safety / Prevention / Crime prevention / Department of Energy and Climate Change / National Nuclear Laboratory / Nuclear proliferation / Information security / Security awareness / Security controls / Computer security / Security / Data security

Security Policy The National Nuclear Laboratory (NNL) believes that its effective management of security and safeguards performance at operational and regulatory level is central to the success of the business. Scope The

Add to Reading List

Source URL: www.nnl.co.uk

Language: English - Date: 2014-04-23 13:20:54
556Data privacy / Privacy law / Health Insurance Portability and Accountability Act / Privacy / Computer security / Data security / Privacy policy / Information security / Protected health information / Ethics / Law / Health

Microsoft Word - Clean Copy - Case HIPAA Policies.DOC

Add to Reading List

Source URL: research.case.edu

Language: English - Date: 2012-11-13 14:10:49
557Crime prevention / National security / Computer security / Public safety / Evaluation / Security / Common Criteria

Microsoft PowerPoint - Informal Security Policy Modellingppt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:07
558United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
559Password strength / Password / Randomness / John the Ripper / Entropy / Password policy / OTPW / Cryptography / Security / Computer security

Of Passwords and People: Measuring the Effect of Password-Composition Policies

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2011-06-21 16:20:55
560Computing / Deep content inspection / Network security / Application firewall / Distributed firewall / Check Point / Computer network security / Computer security / Cyberwarfare

Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration the legiti

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:56
UPDATE