Information security standards

Results: 2339



#Item
271Method engineering / Standards / Business ethics / Human resource management / Corporate governance / Information security / Corporate social responsibility / Information Technology Infrastructure Library / Corporate governance of information technology / Business / Information technology management / Management

Job Description Job Title DIRECTOR OF HUMAN RESOURCES AND CORPORATE GOVERNANCE

Add to Reading List

Source URL: www.england.nhs.uk

Language: English - Date: 2013-08-13 12:05:42
272Reference / Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Cryptographic Module Testing Laboratory / FIPS 140-3 / National Voluntary Laboratory Accreditation Program / FIPS 201 / Federal Information Processing Standard / Cryptography standards / Evaluation / Computer security

Cryptographic Module Validation Program Where security starts …. 5th Annual NIST IT Security Automation Conference Randall J. Easter

Add to Reading List

Source URL: scap.nist.gov

Language: English
273Security / Credit cards / Data privacy / Computing / Payment Card Industry Data Security Standard / Information security / Regulatory compliance / Corporate governance of information technology / COBIT / Payment systems / Information technology management / Data security

® SecureAware Policy Is word processors inadequate when mapping your policies against different standards, and when targeting different user groups? Do you require full or partial compliance with good business practice

Add to Reading List

Source URL: www.neupart.com

Language: English - Date: 2011-05-11 04:27:52
274Computing / Computer law / Federal Information Security Management Act / Information technology management / National Institute of Standards and Technology / Information security / Performance measurement / Security controls / Security management / Computer security / Data security / Security

NIST SPRevision 1, Performance Measurement Guide for Information Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:52:35
275Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
276Cryptographic protocols / Secure communication / Internet standards / Data loss prevention software / Transport Layer Security / Cloud computing / Information privacy / Internet privacy / Data security / Computing / Computer security / Internet

DLP-diagram-simplified-v2-vertical

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2015-01-22 04:28:52
277National security / Trade association / Ipsa / Security guard / The Security Institute / Information Systems Security Association / Independent Parliamentary Standards Authority / International Political Science Association / Security / Public safety / Security Industry Authority

IPSA NEWS The official newsletter of the International Professional Security Association Issue No. 3 IPSA meets the SIA Molly Meacher, Chair of the new Security

Add to Reading List

Source URL: ipsa.org.uk

Language: English - Date: 2011-08-03 18:19:20
278Computer network security / Crime prevention / National security / Software testing / Vulnerability / Social vulnerability / Information security / Countermeasure / Security / Cyberwarfare / Computer security

Information Security Early Warning Partnership - Overview of Vulnerability Handling Process ■ Framework Establishment In July 2004, the notification from the Ministry of Economy, Trade and Industry on “Standards for

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-04-30 23:09:40
279Crime prevention / National security / Gemalto / Computer network security / Federal Information Security Management Act / Multi-factor authentication / Information security / Authentication / Security / Smart cards / Computer security

Major U.S. student loan servicing agency implements Gemalto’s authentication to comply with federal security standards Amsterdam, March 12, 2015 – Gemalto (Euronext NL0000400653 GTO), the world leader in digital secu

Add to Reading List

Source URL: hugin.info

Language: English - Date: 2015-03-11 07:54:26
280Network switch / Computing / Network architecture / Data / Computer network security / Cyberwarfare / Internet standards / Network performance / Transmission Control Protocol / Throughput

A Preliminary Analysis of TCP Performance in an Enterprise Network∗ Boris Nechaev† , Mark Allman‡ , Vern Paxson‡ , Andrei Gurtov† † Helsinki Institute for Information Technology, ‡ International Computer Sc

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-04-19 15:33:32
UPDATE