Federal Information Security Management Act

Results: 1715



#Item
81Law / Computer law / Federal Information Security Management Act / Public safety / Health Insurance Portability and Accountability Act / Information security / Computer security / Security / Data security

Project Coordinator - Employment Opportunities Open to the Public

Add to Reading List

Source URL: www.health.ny.gov

Language: English - Date: 2014-03-14 12:16:00
82Data security / Computing / Public safety / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security risk / Computer security / Security / National Institute of Standards and Technology

NIST Special PublicationRevision 1 Recommended Security Controls for Federal Information Systems Ron Ross

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-13 13:47:31
83Law / Public administration / Extensible Configuration Checklist Description Format / Computer security / Security Content Automation Protocol / Federal Information Security Management Act

Overview: National Checklist Program Chuck Wergin Booz Allen Hamilton National Institute of Standards and Technology (NIST)

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
84National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Risk management framework / Information security management system / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Information security / Computer security / Data security / Security

NIST Special Publication 800-53A Guide for Assessing the Security Controls in Federal Information Systems Building Effective Security Assessment Plans

Add to Reading List

Source URL: www.infogard.com

Language: English - Date: 2011-10-18 16:33:14
85Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 15:05:36
86Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 19:39:09
87Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 15:05:36
88Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 15:05:36
89Federal Information Security Management Act / Security Content Automation Protocol / Cyberwarfare / National Institute of Standards and Technology / FIPS 140 / Federal Desktop Core Configuration / Extensible Configuration Checklist Description Format / NIST Special Publication 800-53 / Computer security / Computing / Security

FDCC/USGCB  2006 – 2014 Federal Desktop Core Configuration & United States Govt. Configuration Baseline  What is FDCC/USGCB? OMB initiative to provide mandatory/uniform configurations for commonly used operating

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-12 09:45:32
90Government / Timesheet / Temporary work / Human resource management / Payroll / Garnishment / Social Security / Federal Insurance Contributions Act tax / IRS tax forms / Taxation in the United States / Employment / Law

AUBURN UNIVERSITY Work Study Employment Office FEDERAL WORK STUDY INFORMATION SHEET Complete this form only if you have been offered Federal Work Study as part of your Financial Aid package and return it to the Work Stud

Add to Reading List

Source URL: www.auburn.edu

Language: English - Date: 2015-05-02 00:57:07
UPDATE