Information security standards

Results: 2339



#Item
121National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Security controls / Information security / Federal Information Processing Standard / Committee on National Security Systems / Computer security / Security / Data security

Microsoft Wordrev3-final-cleanerrata.docx

Add to Reading List

Source URL: www.cloudcontrols.org

Language: English - Date: 2011-06-03 05:36:08
122Section 508 Amendment to the Rehabilitation Act / Accessibility / PDF/UA / Website / Web content / Software / Technology / Content management systems / Web accessibility / World Wide Web

Social  Security  Administration     Agency  Comments  on  Docket  #ATBCB-­2015-­0002,  Information   and  Communication  Technology  (ICT)  Standards  and  Guidelines

Add to Reading List

Source URL: law.resource.org

Language: English - Date: 2015-05-28 16:05:35
123Network management / Computer security / System administration / Internet protocols / Internet standards / OSSEC / Security information and event management / Security event manager / Log analysis / System software / Computing / Information technology management

Silensec documents RED CHUNGU 13_07_16_v4(web)

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:19:36
124Identity / International standards / Identity theft / Theft / Personally identifiable information / Anti-theft system / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Security / Crimes / Ethics

MEDICAL IDENTITY THEFT ENVIRONMENTAL SCAN OCTOBER 15, 2008 Prepared by Booz Allen Hamilton: Contract Number: HHSP233200045008XI NOTE: On February 17, 2009 a correction was made to the Medical Identity Theft

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-01-18 20:42:32
125Computing / Crime prevention / Information security / National security / ISO/IEC JTC1 / (ISC)² / Certified Information Systems Security Professional / ISO JTC 1/SC 27 / Aloysius Cheang / Data security / Security / Computer security

Greg Mazzone, CISSP, CISA Member, (ISC)² Asian Advisory Board Standards Australia IT12-04 Information Security committee member (Australian mirror ISO JTC 1/SC27 IT Security Techniques) --------------------------------

Add to Reading List

Source URL: www.informationsecurityasia.com

Language: English - Date: 2012-07-19 00:21:40
126BSI Group / Public key certificate / ISO/IEC 27001 / Evaluation / Reference / Computer security / ISO/IEC 27001 lead implementer / British Standards / IEC / Public-key cryptography

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ID CHECKER.NL B.V. Tingieterweg 44

Add to Reading List

Source URL: www.idchecker.nl

Language: English - Date: 2015-06-17 10:14:57
127Computer security / Information technology / OWASP / Security / SAP AG / Application security / European Telecommunications Standards Institute / Web application security / Ambient intelligence / Computing / Computer network security / Technology

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:43:23
128Data security / ISO standards / Biometrics / Information sensitivity / Biometric passport / Extended Access Control / Common Criteria / Machine-readable passport / Contactless smart card / Security / National security / Passports

Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE (EAC PP) BSI-CC-PP-0056-V2Version 1.3.0, 20th January 2012)

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:28:28
129Secrecy / Password / Non-disclosure agreement / Email / Internet / Computing / Standards for Security Categorization of Federal Information and Information Systems / Ethics / Confidentiality / Journalism sourcing

Operational Tools Confidentiality Agreement

Add to Reading List

Source URL: www.ucop.edu

Language: English - Date: 2012-12-18 15:53:24
130Computing / System software / Internet protocols / Internet standards / Syslog / Computer security / Event Viewer / USENIX / Security log / System administration / Information technology management / Network management

Short Topics in 12 System Administration Rik Farrow, Series Editor Building a Logging

Add to Reading List

Source URL: c59951.ssl.cf2.rackcdn.com

Language: English - Date: 2011-12-21 13:02:02
UPDATE