Cryptography

Results: 21893



#Item
721Security / Computer network security / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Information technology controls / SarbanesOxley Act / Internal control / Computer security / Regulatory compliance

SECURITY COMPLIANCE MANAGEMENT COMPLY WITH SARBANES-OXLEY IT SECURITY CONTROLS The Challenge Section 404 of the Sarbanes-Oxley Act (SOX) requires that chief executives attest to the

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
722Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
723Identity management / Law / Privacy / Cryptography / Computer security / Digital media

Sensitive Information in a Wired World Supported by the National Science Foundation under the ITR Program JOAN FEIGENBAUM

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2003-12-06 08:26:04
724Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-03-09 11:24:03
725Security / Prevention / Computing / Data security / Crime prevention / Cryptography / Information governance / National security / ISO/IEC 27002 / Computer security / Information security / Professional certification

Mobilität und Leihpersonal als Security-Fallen:

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:20
726Computer access control / Security / Prevention / Obfuscation / Password / Identity management / Cryptography / Password manager

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
727Law / United States federal banking legislation / Economy / Government / 106th United States Congress / Cryptography law / Electronic Signatures in Global and National Commerce Act / Systemic risk / Electronic signature / Truth in Lending Act / Consumer protection / Federal Deposit Insurance Corporation

The Electronic Signatures in Global and National Commerce Act (E-Sign Act)

Add to Reading List

Source URL: www.fdic.gov

Language: English - Date: 2016-04-29 12:16:07
728Computer access control / Computer security / Cryptography / Security / Authentication / Password / Multi-factor authentication / Electronic authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
729Security / Prevention / Safety / Crime prevention / National security / Cryptography / Information governance / E-commerce / Information security / Computer security / Health Insurance Portability and Accountability Act / Payment Card Industry Data Security Standard

Microsoft Word - Facility Security Plan Standard.doc

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2013-02-19 08:45:20
730Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
UPDATE