Information security standards

Results: 2339



#Item
611Computing / Security / Law / HTTP cookie / PayPal / Personally identifiable information / In re Gateway Learning Corp. / Information privacy / Ethics / Internet privacy / Privacy

PRIVACY POLICY Why Is A Privacy Policy Important To Me? We are firmly committed to protecting both our current and former members’ financial and personal information. We maintain high standards to safeguard personal in

Add to Reading List

Source URL: www.nadex.com

Language: English - Date: 2015-02-09 17:46:02
612Computer network security / Directory services / Internet protocols / Internet standards / Cryptographic protocols / MongoDB / Lightweight Directory Access Protocol / Kerberos / Transport Layer Security / Computing / Data / Information

MongoDB databases at risk – Several thousand MongoDBs without access control on the Internet Jens Heyens, Kai Greshake, Eric Petryka January 2015

Add to Reading List

Source URL: cispa.saarland

Language: English - Date: 2015-02-10 13:33:22
613International Organization for Standardization / Data security / Evaluation / Management / ISO/IEC 27000-series / ISO/IEC 27001 / Information technology management / Standards organizations / Computing

Education or court columns

Add to Reading List

Source URL: www.iso.org

Language: English - Date: 2015-01-30 04:58:12
614Computing / Standards / Professional certification / Information security / Public safety / Global Information Assurance Certification / Data security / Security

The following application must be submitted as documentation of your Continuing Professional Education (CPEs). Once you have registered and paid for the renewal in the Certification History section of your GIAC account,

Add to Reading List

Source URL: www.giac.org

Language: English - Date: 2014-04-21 14:12:18
615Computer security / Crime prevention / Public safety / Standards organizations / Institute of Electrical and Electronics Engineers / IEEE Computer Society / IEEE Communications Society / Information assurance / Information security / Security / National security / International nongovernmental organizations

Proposal to Establish the IEEE CS Task Force on Information Assurance presented by

Add to Reading List

Source URL: www.ieee-tfia.org

Language: English - Date: 2010-03-02 12:13:24
616Computer security / Computing / Quality assurance / Global Information Assurance Certification / Standards / Evaluation

Microsoft PowerPoint - GIAC_Program_Overview_v2014_Q1_short.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.giac.org

Language: English - Date: 2014-01-20 17:16:30
617Secure communication / Network architecture / Internet privacy / Cryptographic protocols / Internet standards / Transport Layer Security / STARTTLS / Email encryption / Email client / Internet / Computing / Email

0RGXVŒ(QFU\SWLRQ ,QWURGXFWLRQ Email is increasingly transactional in nature; it is used to communicate with employees, customers and partners. That being said, a considerable amount of sensitive information is sent

Add to Reading List

Source URL: www.vircom.ch

Language: English - Date: 2011-10-25 12:08:17
618Computer storage / Data security / Standards organizations / Theft / USB flash drive / Computer data storage / Backup / Institute of Electrical and Electronics Engineers / Data storage device / Computer hardware / Information science / Information

STANDARDS Security in Storage: A Call for Participation Jack Cole, US Army Research Laboratory

Add to Reading List

Source URL: msstc.org

Language: English - Date: 2010-03-02 12:00:02
619Data security / National security / Software testing / Federal Information Security Management Act / Information security / National Institute of Standards and Technology / Vulnerability / HTML / NIST Special Publication 800-53 / Computer security / Computing / Security

NIST SP[removed]Version 2 Guidelines on Active Content and Mobile Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:25:03
620Accreditation / ISO/IEC 27001 / Conformity assessment / European Telecommunications Standards Institute / Common Criteria / International Accreditation Forum / Public key certificate / Information security / ISO / Evaluation / Security / Quality assurance

TS[removed]V2[removed]Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust Service Providers

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-11-07 10:03:52
UPDATE