Information security standards

Results: 2339



#Item
461Certified Information Systems Security Professional / Data security / Federal Information Security Management Act / National Institute of Standards and Technology / Security / Computer security / Computing

FISSEA 28th Annual Conference - March 24-25, [removed]Preliminary Agenda

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-17 14:06:00
462ISO standards / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Ethics / Thought / Common Criteria / National Voluntary Laboratory Accreditation Program / Validation / Federal Information Security Management Act / Evaluation / Computer security / Common Criteria Testing Laboratory

National Information Assurance Partnership /Common Criteria Evaluation and Validation Scheme Publication #2 Quality Manual and Standard Operating Procedures

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-05-14 07:52:21
463Standards organizations / Communication / Machine-to-Machine / European Telecommunications Standards Institute / ETSI Satellite Digital Radio / SMS / Hardware security module / Transport Layer Security / GSM / Technology / Mobile technology / Information

TR[removed]V1[removed]Analysis of Security Solutions for the oneM2M System

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-07-25 03:15:58
464Computer network security / Directory services / Internet protocols / Internet standards / Cryptographic protocols / MongoDB / Lightweight Directory Access Protocol / Kerberos / Transport Layer Security / Computing / Data / Information

MongoDB databases at risk – Several thousand MongoDBs without access control on the Internet Jens Heyens, Kai Greshake, Eric Petryka January 2015

Add to Reading List

Source URL: cispa.saarland

Language: English - Date: 2015-03-09 04:26:59
465Government / Data protection / Information privacy / Information security / Internet privacy / Personally identifiable information / Health Insurance Portability and Accountability Act / Privacy / Ethics / Security

Computer and information security standards For general practices and other office-based practices Healthy Profession. Healthy Australia.

Add to Reading List

Source URL: www.racgp.org.au

Language: English - Date: 2014-03-06 16:50:28
466ISO/IEC 27002 / ISO/IEC 20000 / Computer security / Evaluation / ISO/IEC 27003 / British Standards / Information security management system / TickIT / ISO/IEC 27000-series / Information technology management / Computing / ISO/IEC 27001

8846_BSI_Product Flyer_27001.indd

Add to Reading List

Source URL: www.bsigroup.com

Language: English - Date: 2014-03-17 04:35:16
467Quality assurance / ISO/IEC JTC1 / ISO 10303 / International Organization for Standardization / American National Standards Institute / Computing / Information technology management / Computer file formats / Computer security / Standards organizations / Evaluation / Accreditation

Base Standard Program ISO[removed]Environmental Management Systems CB Application for Accreditation FA 5001

Add to Reading List

Source URL: anab.org

Language: English - Date: 2014-12-29 17:01:35
468Information / Internet standards / Network management / System administration / Multi-agent systems / Simple Network Management Protocol / Security service / Digest access authentication / Communications protocol / Computing / Data / Internet protocols

Network Working Group Request for Comments: 1352 J. Galvin Trusted Information Systems, Inc. K. McCloghrie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:16
469Privacy / Data security / National security / Crime prevention / Information security / Information privacy / Internet privacy / Regulatory compliance / Hong Kong Police Force / Security / Ethics / Computer security

STANDARDS FOR LAW ENFORCEMENT DATA SECURITY STANDARDS FOR LAW ENFORCEMENT DATA SECURITY September 2014

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2015-03-11 23:44:25
470Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Router / Resource Public Key Infrastructure / European Network and Information Security Agency / Peering / Network architecture / Internet / Computing

Secure Routing July State-of-the-art Deployment and Impact on Network Resilience Secure routing: State-of-the-art deployment and impact on network resilience

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-09-28 16:55:53
UPDATE