Information security standards

Results: 2339



#Item
381Computer network security / Crime prevention / National security / Software testing / Vulnerability / Social vulnerability / Information security / Countermeasure / Security / Cyberwarfare / Computer security

Information Security Early Warning Partnership - Overview of Vulnerability Handling Process ■ Framework Establishment In July 2004, the notification from the Ministry of Economy, Trade and Industry on “Standards for

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-04-16 04:31:36
382Computer network security / Data security / Crime prevention / National security / Information security / Password / Access control / Security controls / Authentication / Security / Computer security / Cyberwarfare

< PAGE >1 UNSW IT Security Standards & Guidelines

Add to Reading List

Source URL: www.it.unsw.edu.au

Language: English - Date: 2010-04-07 20:19:51
383Committees / Consultative Committee for Space Data Systems / German Aerospace Center / Information security / Telemetry / Space exploration / Public key infrastructure / Cryptography / National Security Agency / Spaceflight / Space technology / CCSDS

Report Concerning Space Data System Standards SPACE MISSIONS KEY MANAGEMENT CONCEPT INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2011-11-16 21:51:40
384Data security / Security / Measurement / Committees / Consultative Committee for Space Data Systems / Science / Information security / German Aerospace Center / National Institute of Standards and Technology / Standards organizations / CCSDS / Computer security

Report Concerning Space Data System Standards INFORMATION SECURITY GLOSSARY OF TERMS

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2012-11-15 20:04:43
385Data / Information / Internet protocols / Internet standards / Transmission Control Protocol / HTTP Secure / Circular buffer / Transport Layer Security / Cipher suite / Cryptographic protocols / Secure communication / Computing

Internals of Nut/TLS Daniel Otte ([removed]) September[removed]Abstract

Add to Reading List

Source URL: www.ethernut.de

Language: English - Date: 2013-02-13 13:03:31
386Common Criteria / Standards / Public key certificate / Security Target / Professional certification / Information security / Public safety / Computer security / Security / Evaluation

The Norwegian Certification Scheme

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:29
387Computing / ISO/TC 223 / ISO/IEC 19770 / International Organization for Standardization / ISO/IEC JTC1 / ISO/IEC 15504 / Information security management system / Computer file formats / Technology / Information technology management / ISO/TC 176 / Standards organizations

ISO/TMB/TS/P[removed]TS/P 247: Proposal to transform ISO/PC 251 Asset management into a TC Dear ISO Members,

Add to Reading List

Source URL: www.jisc.go.jp

Language: English - Date: 2014-11-27 20:37:20
388Technical communication / XML / Information privacy / Information security / Computing / OSI protocols / Markup languages

[removed]About LISA: – Legal Information Standards Action-network I. Information standards and law Information standards (IS) is a core feature in today’s global Internet world, which

Add to Reading List

Source URL: www.juridicum.su.se

Language: English - Date: 2003-03-14 01:31:46
389Cryptographic software / Secure communication / Data / Information / Internet standards / Transport Layer Security / GnuTLS / CyaSSL / Cipher suite / Cryptographic protocols / Internet protocols / Computing

1 A Messy State of the Union: Taming the Composite State Machines of TLS Benjamin Beurdouche∗ , Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , Cedric Fournet† , Markulf Kohlweiss† , Alfredo Pironti∗ , P

Add to Reading List

Source URL: www.smacktls.com

Language: English - Date: 2015-03-05 00:10:02
390Standards / Information Technology Infrastructure Library / Information technology management / Method engineering

CASE STUDY National Grocery Chain gets a Taste of Telaid’s Physical Security Technology Expertise and Deployment Capabilities Amidst multiple types and brands of devices, varied infrastructure and 24/7

Add to Reading List

Source URL: www.telaid.com

Language: English - Date: 2014-05-30 12:49:54
UPDATE