Federal Information Security Management Act

Results: 1715



#Item
21Review-Doc-2015-ITORdocx

Review-Doc-2015-ITORdocx

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-10-30 16:10:54
22Montana Operations Manual Appendix Issuing Authority  Category

Montana Operations Manual Appendix Issuing Authority Category

Add to Reading List

Source URL: www.mdt.mt.gov

Language: English - Date: 2016-05-12 15:12:14
231  (Second Draft) NIST Special Publication

1 (Second Draft) NIST Special Publication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-20 22:57:29
24Earth	System	Grid	Federation	(ESGF) Software	Security	Plan

Earth System Grid Federation (ESGF) Software Security Plan

Add to Reading List

Source URL: esgf.llnl.gov

Language: English - Date: 2016-06-01 13:26:15
25Microsoft Word - SPspd-final

Microsoft Word - SPspd-final

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-03 23:25:26
26Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-05 09:50:54
27Review-Doc-2015-ITORdocx

Review-Doc-2015-ITORdocx

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-10-30 16:10:53
28

PDF Document

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-02-02 11:36:30
29ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-03-15 12:05:28
30Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity  March 2013

Measuring What Matters: Reducing Risk by Rethinking How We Evaluate Cybersecurity March 2013

Add to Reading List

Source URL: www.tdisecurity.com

Language: English - Date: 2014-04-02 16:48:01