Network security policy

Results: 1254



#Item
201Computer network security / Privacy / Internet activism / Technology / Computing / Great Firewall of China / Google China / Censorship / Citizen Lab / Content-control software / Internet censorship / Internet

Testimony of Rebecca MacKinnon Visiting Fellow, Center for Information Technology Policy, Princeton University Co-Founder, Global Voices Online (globalvoicesonline.org) At the hearing: “The Google Predicament:

Add to Reading List

Source URL: rconversation.blogs.com

Language: English - Date: 2010-03-10 08:13:58
202Network performance / Computer networking / Internet privacy / Videotelephony / Computer network security / Proxy server / Gateway / Client–server model / Bandwidth management / Computing / Network architecture / Internet

Policy.Net: Policy Based Network Traffic Management Copyright © , NetVeda LLC. All rights reserved. OVERVIEW Network access is an integral and often critical

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:57
203Network architecture / Computer architecture / Virtual private networks / Internet protocols / IPsec / Network Extrusion / VoIP VPN / Computer network security / Computing / Internet privacy

Virtual Private Network (VPN) Policy A virtual private network is used to provide secure, encrypted communication between a network and a remote host or other remote networks over the public Internet. VPNs allow the esta

Add to Reading List

Source URL: www.fpweb.net

Language: English - Date: 2014-12-23 16:56:42
204Computer network security / Routers / Cisco Catalyst / Cisco Systems / TACACS+ / Cisco IOS / TACACS / FIPS 140 / IPsec / Computing / Network architecture / Data

Microsoft Word - 3850_3650_Security_Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-20 12:34:19
205Computer security / Security / Password / Internet privacy / Acceptable use policy / Network security / Digital Millennium Copyright Act / Password policy / Logical security / Computing / Email / Internet

Acceptable Use Policy Department of Information Technology Olivet Nazarene University

Add to Reading List

Source URL: it.olivet.edu

Language: English - Date: 2014-12-15 16:07:18
206Network architecture / Computing / Reduced pressure zone device / Domain Name System Security Extensions / BIND / Resolver / Extension mechanisms for DNS / PowerDNS / Internet / Domain name system / Internet protocols

DNS Response Policy Zones Roadmap to Accellerate Adoption Hugo M. Connery Based on input from the DNS RPZ Community June 28, 2013

Add to Reading List

Source URL: dnsrpz.info

Language: English - Date: 2013-06-28 10:34:50
207Computer security / Crime prevention / Data security / University of Colorado Colorado Springs / Physical security / Data center / Network security / Vulnerability / Information security management system / Security / Public safety / National security

CAMPUS POLICY Now is the tie for all good men to POLICY NUMBER:

Add to Reading List

Source URL: www.uccs.edu

Language: English - Date: 2015-04-22 23:03:13
208Space policy / Space policy of the United States / Space / United States Space Surveillance Network / Space debris / Global Positioning System / Satellite / Defense Intelligence Agency / Central Intelligence Agency / Technology / Spaceflight / Space technology

U.S. Objectives for Space III. U.S. Objectives for Space How the U.S. develops the potential of space for civil, commercial, defense and intelligence purposes will affect the nation’s security for decades to come.

Add to Reading List

Source URL: www.dod.gov

Language: English - Date: 2003-10-14 14:47:54
209National security / United States government secrecy / Computer network security / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Protection Profile / Common Criteria / Committee on National Security Systems / Security / Computer security / Evaluation

Committee on National Security Systems CNSS Policy NoJune 2013 NATIONAL POLICY GOVERNING THE ACQUISITION OF

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-07-09 07:21:16
210Public safety / Prevention / Information technology management / National security / Information security / Network security / Security policy / IT risk management / ISO/IEC 27002 / Security / Computer security / Data security

ISPME Version 12 Data Sheet Information Security Policies Made Easy, Version 12 is the latest version of the “gold standard” information security policy resource used by over 9000 organizations worldwide. Based on th

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2012-02-08 06:58:28
UPDATE