Information security standards

Results: 2339



#Item
101Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:33:21
102Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

Add to Reading List

Source URL: npdoty.name

Language: English - Date: 2014-03-25 02:38:49
103Security / Prevention / Computer security / Safety / Data security / Cryptography / National security / Information security / Security controls / Access control / Password / ISO/IEC 27001:2005

Apollo Education Group Information Security Asset Management Responsibility and Acceptable Use Standards Document

Add to Reading List

Source URL: www.apollo.edu

Language: English - Date: 2016-02-19 07:01:47
104

Statewide Information Technology Standards Office of the Governor State Chief Information Officer Information Security Manual

Add to Reading List

Source URL: nciips.org

Language: English - Date: 2015-07-20 18:01:52
    105

    Information Security Manual Prepared by the IIPS Security Standards Committee

    Add to Reading List

    Source URL: nciips.org

    Language: English - Date: 2015-07-30 16:33:56
      106

      Payment Card Industry Data Security Standards (PCI DSS) Merchant Services Payment Card Processing Procedures The main contact and employees that will have access to sensitive payment card information are responsible for

      Add to Reading List

      Source URL: finance.fiu.edu

      Language: English - Date: 2015-06-04 09:25:08
        107

        Michigan Technological University Information Security Plan The Information Security Plan establishes and states the policies governing Michigan Technological University’s IT standards and practices. These policies de

        Add to Reading List

        Source URL: www.security.mtu.edu

        Language: English - Date: 2012-10-11 13:43:20
          108Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Domain Name System / Start menu / Installation / Control Panel

          Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

          Add to Reading List

          Source URL: unbound.net

          Language: English - Date: 2015-05-20 02:41:14
          109Software / System software / Computing / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Start menu

          Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

          Add to Reading List

          Source URL: unbound.nlnetlabs.nl

          Language: English - Date: 2015-05-20 02:41:14
          110

          Michigan Technological University Information Security Plan The Information Security Plan establishes and states the policies governing Michigan Technological University’s IT standards and practices. These policies de

          Add to Reading List

          Source URL: security.mtu.edu

          Language: English - Date: 2012-10-11 13:43:20
            UPDATE