Network security policy

Results: 1254



#Item
471Health informatics / International standards / Computer network security / Identity / Identity management / Authentication / Patient portal / Personal health record / Password / Health / Computer security / Security

HIT Policy Committee Transmittal Letter, May 3, 2013

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:16:50
472Energy / Committee on Industry /  Research and Energy / Europe / Energy in the European Union / Agency for the Cooperation of Energy Regulators / Energy policy / European Network and Information Security Agency / European Parliament / Agencies of the European Union / Energy economics / European Union

A WORD FROM THE CHAIR Since the last official ITRE committee meeting, we have met many times in the context of Commissioner hearings. We

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2014-11-05 08:36:49
473Electronic engineering / Wi-Fi / Wireless access point / Internet / Password / Wireless network / Login / Wireless security / Wireless networking / Technology / Wireless

ZSL – Visitor Wireless Internet Access Policy and Procedure 1. v1[removed]

Add to Reading List

Source URL: www.zsl.org

Language: English - Date: 2014-02-18 12:00:32
474Routing / Internet standards / Internet governance / Routing Assets Database / Routing Policy Specification Language / Computer networks / Resource Public Key Infrastructure / Merit Network / Validation / Internet / Network architecture / Computing

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-20 10:15:01
475Crime prevention / Electronic commerce / National security / Secure communication / Research and development / Public safety / Security / Computer network security / Computer security

NITRD Organization Chart White House Executive Office of the President Office of Science and Technology Policy

Add to Reading List

Source URL: www.nitrd.gov

Language: English - Date: 2014-09-30 13:00:43
476Crime prevention / National security / Computer network security / Secure communication / Data security / Mainframe computer / Backup / Vulnerability / Security / Computer security / Cyberwarfare

ENCRYPTING MAINFRAME AND SERVER TAPES TECHNOLOGY LETTER[removed]Frequently Asked Questions Technology Letter[removed]announces a change to State Administrative Manual (SAM) Section[removed]By eliminating a policy exclusion i

Add to Reading List

Source URL: www.cta.ca.gov

Language: English - Date: 2013-06-28 15:10:34
477Crime prevention / National security / Computing / Laptop / Mobile computing / Encryption / Computer security / Data security / Cyberwarfare / Disk encryption / Security / Computer network security

Microsoft Word - Laptop Encryption Policy[removed]For Posting.doc

Add to Reading List

Source URL: oa.mo.gov

Language: English - Date: 2013-01-29 15:15:49
478Computing / Public safety / Email / Computer network security / Electronic commerce / Information security / Password / Internet privacy / Computer security / Security / Crime prevention / National security

Local Government Cyber Security: Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2010-09-13 14:44:27
479National security / Email / Computer network security / Internet / Password / Internet privacy / Malware / Computer security / Authorization / Security / Computing / Crime prevention

Cyber Security Internet and Acceptable Use Policy Template A Non-Technical Guide Essential for Business Managers

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2012-07-11 15:21:10
480Electronic commerce / Computer network security / National security / GlobalSign / Public key infrastructure / Two-factor authentication / Computer security / Certificate policy / XUDA / Cryptography / Public-key cryptography / Key management

CYBER SECURITY SECURING VITAL INFRASTRUCTURE In this issue GlobalSign looks at how Public Key Infrastructure (PKI)

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2014-04-24 10:16:50
UPDATE