Information security standards

Results: 2339



#Item
261Law / Privacy / Internet privacy / National Institute of Standards and Technology / Privacy Office of the U.S. Department of Homeland Security / IT risk / Ethics / Computer security / Information technology management

Summary of the Privacy Engineering Workshop at the National Institute of Standards and Technology (April 9-10, 2014)

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-05-21 09:55:14
262Computing / World Wide Web / BSI Group / Key management / Yammer / ISO/IEC 27001 / Kitemark / Public key certificate / Management system / Security / British Standards / IEC

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: Microsoft Yammer Division 1355 Market Street

Add to Reading List

Source URL: about.yammer.com

Language: English - Date: 2015-03-18 12:49:41
263Computing / Professional certification / Information Technology Infrastructure Library / Certified Business Continuity Professional / Certification / Certified Information Security Manager / Information technology audit / Information Systems Audit and Control Association / (ISC)² / Standards / Evaluation / Education

8th Annual Business Continuity Compensation Report Asia Pacific — April, 2009 Average Total Compensation by Region - FTE Region

Add to Reading List

Source URL: www.bcmanagement.com

Language: English - Date: 2010-03-15 08:50:55
264Information Technology Infrastructure Library / Method engineering / Standards / Motorola / IDIQ / Mobile radio / IT service management / Government / SBInet / Information technology management / Technology / United States Department of Homeland Security

Streamlining the Business of Government. DHS–Wide Tactical Communications (TacCom) Contract Number: HSSS01-12-DThe DHS-wide Tactical Communications (TacCom) contract is a multiple

Add to Reading List

Source URL: www.affigent.com

Language: English - Date: 2013-08-06 11:04:24
265Security / Identity document / Identification / Card reader / Government / Contactless smart card / Credit card / ISO standards / Ubiquitous computing / Smart cards

CB) For discussion on 20 DecemberLegislative Council Panel on Information Technology

Add to Reading List

Source URL: www.legco.gov.hk

Language: English
266Auditing / Security / Information technology audit / Standards / Software testing / Penetration test / Information Systems Audit and Control Association / Certified Information Security Manager / Information security management / Computer security / Data security / Computing

CESG Certified Professional Scheme – qualification requirements For practitioner applications we require proof of a relevant information assurance certification. A copy of your certificate must be provided along with y

Add to Reading List

Source URL: certifications.bcs.org

Language: English - Date: 2014-10-01 04:18:04
267Data security / Crime prevention / Information security / National security / Federal Information Security Management Act / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / Cyber security standards / System administrator / Computer security / Security / Computing

Microsoft Word - ImportanceOfSecurityRolesAndResponsibilitiesV3.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2010-06-03 23:12:51
268United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
269Domain name system / Internet protocols / Key management / Internet standards / DNSSEC / Domain Name System Security Extensions / Unbound / Windows / Name server / Internet / System software / Computing

Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, October 2010 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

Add to Reading List

Source URL: unbound.net

Language: English - Date: 2010-11-08 06:57:17
270Computer network security / Data security / NIST RBAC model / Role-based access control / PERMIS / Solid-state drive / International Committee for Information Technology Standards / Hierarchy / Computer security / Security / Access control

Microsoft Word - BSR+INCITS+359.doc

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
UPDATE