Federal Desktop Core Configuration

Results: 52



#Item
41Computing / Federal Desktop Core Configuration / Federal Information Security Management Act / Validation / Vulnerability / Computer security / Cyberwarfare / Security Content Automation Protocol

Security Content Automation Protocol (SCAP) Validation and the Federal Desktop Core Configuration (FDCC) Peter Mell, SCAP Validation Program Manager National Institute of Standards and Technology

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
42Software / Federal Information Security Management Act / Security controls / Risk management framework / Federal Desktop Core Configuration / Internet Explorer 7 / Security Content Automation Protocol / Computer security / Microsoft Windows / Computing

Risk Management and the Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 Kevin Stine

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
43Windows Vista / FTP clients / News aggregators / Windows XP / Computer security / Kerberos / Open Vulnerability and Assessment Language / Federal Desktop Core Configuration / Internet Explorer 7 / Microsoft Windows / Software / Computing

Enhancing the FDCC Content Andrew Buttner January 24, 2008 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: nvd.nist.gov

Language: English
44Internet Explorer / Windows XP / Windows Vista / Remote desktop / Federal Desktop Core Configuration / Encrypting File System / Group Policy / Windows Registry / Windows / Microsoft Windows / Software / System software

FDCC Implementers Workshop David L. Dixon Sr. Consultant, Microsoft Federal Services FDCC Team 

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
45Software / Federal Desktop Core Configuration / Security Content Automation Protocol / Federal Information Security Management Act / Windows XP / Windows Vista / Extensible Configuration Checklist Description Format / Group Policy / Windows / Microsoft Windows / Computer security / Computing

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]August 11, 2008 M-08-22

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2008-08-12 11:52:10
46National Institute of Standards and Technology / Gaithersburg /  Maryland / Law / Public administration / Computer security / Federal Information Security Management Act / Federal Desktop Core Configuration

Federal Desktop Core Configuration Implementers Workshop NIST Red Auditorium – Gaithersburg, Maryland, January 24th, 2008 9:00 – 9:30

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2008-01-14 10:03:41
47National Institute of Standards and Technology / Chief information security officer / Regulatory compliance / Management / Government / Law / Information Security Automation Program / Security Content Automation Protocol / Computer security / Federal Information Security Management Act / Federal Desktop Core Configuration

3rd Annual Security Automation Conference & Exposition NIST, DISA, NSA Gaithersburg, Maryland, September 19-20, 2007

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:53:44
48Government / Computer security / Federal Desktop Core Configuration / Office of Management and Budget

USDA United States Department of Agriculture Office of the Chief InformeUon Officer

Add to Reading List

Source URL: www.ocio.usda.gov

Language: English - Date: 2012-11-29 15:49:57
49Security / Cyberwarfare / Validation / Federal Information Security Management Act / Federal Desktop Core Configuration / National Institute of Standards and Technology / Computer security / Security Content Automation Protocol / Computing

Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements, April 2013 ITL Security Bulletin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 12:34:21
50Computer security / Baseline / Configuration management / Software project management / Group Policy / Windows / Microsoft Security Essentials / Federal Desktop Core Configuration / CimTrak / Software / Microsoft Windows / System software

Page 29-30_Informatics 10-Oct-13 2:12 PM Page 29 Technology Update

Add to Reading List

Source URL: informatics.nic.in

Language: English - Date: 2013-10-15 03:18:23
UPDATE