Information security standards

Results: 2339



#Item
131Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
132Medical informatics / International standards / Healthcare / Medical terms / Electronic health record / Patient safety / Health information technology / Personal health record / Radio-frequency identification / Health / Medicine / Health informatics

Standards Based RFID information processing solutions with lower costs, higher interoperability and stronger security TM Clinical Information

Add to Reading List

Source URL: aventyn.com

Language: English - Date: 2009-11-04 19:10:06
133Standards for Security Categorization of Federal Information and Information Systems / Government procurement in the United States / Federal Information Security Management Act / Procurement / National Oceanic and Atmospheric Administration / Business / Government / Management / Computer security / National Institute of Standards and Technology / Military acquisition

Acquisition AlertSupply Chain Risk Management for Acquiring High and Moderate lmpact Information Systems

Add to Reading List

Source URL: www.ago.noaa.gov

Language: English - Date: 2015-06-02 22:02:09
134Computer network security / Crime prevention / National security / Public safety / Auditing / DMZ / Information security / Statement on Auditing Standards No. 70: Service Organizations / Data center / Security / Computing / Computer security

Send Word Now Security and Technology Overview Send Word Now’s goal is to provide a completely secure, flexible, scalable, and reliable system that customers can trust. Our infrastructure is based on a strong foundatio

Add to Reading List

Source URL: www.sendwordnow.com

Language: English - Date: 2011-01-27 15:29:18
135Law / Ethics / Credit cards / Payment systems / Computer law / Personally identifiable information / Payment Card Industry Data Security Standard / Health Insurance Portability and Accountability Act / Information security / Security / Computer security / Data privacy

Privacy Legislation and Industry Security Standards Issue No

Add to Reading List

Source URL: www.alliant.com

Language: English - Date: 2014-08-04 13:15:38
136Computing / Standards organizations / Computer security / Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Metrology / Cloud computing / Smart grid / Security / Crime prevention / National security

Information Technology Laboratory Letter from the Director T

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-05-19 13:24:18
137Data security / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Privacy / Information security / Computing / NIST Enterprise Architecture Model / Computer security / Security / Ethics

Microsoft Word - M0395_v1_4717582962

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-04-26 21:21:41
138Information / Application server / Communications protocol / Computer network / Computer security / Application architecture / IEEE Standards Association / OSI model / Application security / Computing / Data / Software architecture

Statewide Information Technology State of North Carolina STATEWIDE GLOSSARY OF INFORMATION

Add to Reading List

Source URL: www.scio.nc.gov

Language: English - Date: 2015-01-22 11:06:56
139Internet / Cryptography / Internet standards / Internet protocols / Electronic commerce / Transport Layer Security / HTTP Secure / Password / FTPS / Computing / Cryptographic protocols / Secure communication

Instant, Secure and Accountable Lua Security Whitepaper Security is Paramount We know that when you communicate with your team, information security is paramount.

Add to Reading List

Source URL: citrixready.citrix.com

Language: English - Date: 2015-06-09 15:09:38
140Computer security / Identity management / Cloud standards / Information Card / OpenID / Digital identity / Liberty Alliance / OAuth / Online identity / Computing / Identity / Federated identity

Book of Proceedings www.internetidentityworkshop.com Collected & Compiled by KAS NETLER, HEIDI N SAUL AND BARBARA BYERS Notes in this book can also be found online at

Add to Reading List

Source URL: www.internetidentityworkshop.com

Language: English - Date: 2015-05-20 16:35:11
UPDATE