Network security policy

Results: 1254



#Item
611Telecommunications engineering / Wireless LAN / Wireless security / Wireless network / New York City Department of Information Technology and Telecommunications / Network security / Cracking of wireless networks / Wi-Fi / Wireless networking / Technology / Wireless

The City of New York CITYWIDE INFORMATION SECURITY POLICY Wireless Security Policy The Policy Wireless devices or networks used to access, store, process, or transmit City of New York

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2014-09-09 15:26:31
612Digital media / Computer security / Computer network security / Crime prevention / National security / Acceptable use policy / Password / Internet / Computer network / Email / Computing / Technology

Computer Acceptable Use Policy (AUP) Computer network and internet access is provided for students and employees of Lancaster Bible College for the purpose of furthering students’ education and providing tools for facu

Add to Reading List

Source URL: www.lbc.edu

Language: English - Date: 2014-11-14 15:16:09
613McAfee / Computer network security / FIPS 140 / Firewall / Cyberwarfare / Comparison of firewalls / McAfee VirusScan / Cryptography standards / Computer security / Computing

1C - McAfee Firewall Enterprise 2150F Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-12-22 09:05:42
614Cryptographic protocols / Data / Information / Internet protocols / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / TACACS+ / TACACS / Computer network security / Computing / Wireless networking

FIPS[removed]Security Policy for Cisco 4402 and 4404 Wireless LAN Controllers Feb 05, 2014 Version 4.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-10 13:05:34
615Cyberwarfare / Check Point VPN-1 / Virtual private network / Check Point / FIPS 140 / IPsec / Cryptography / Security and safety features new to Windows Vista / ZoneAlarm Z100G / Computer network security / Computing / Computer security

Check Point VPN-1_NGX _R60_ Security Policy v1.0_Final.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
616Computer security / FIPS 140 / Automated teller machine / Asynchronous Transfer Mode / Zeroisation / Network switch / Cryptography standards / Technology / Computing

Lucent AP600 Security Policy.PDF

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
617FIPS 140 / PKCS11 / PKCS / Crypt / Initialization vector / Zeroisation / Advanced Encryption Standard / Network Security Services / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

NSS Cryptographic Module Version[removed]FIPS[removed]Non-Proprietary Security Policy Level 1 Validation Red Hat, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-05 11:11:44
618Internet / Network architecture / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Firewall / Transport Layer Security / Simple Network Management Protocol / Computing / Internet protocols / Internet standards

McAfee, Inc. McAfee Firewall Enterprise 2150E Hardware Part Number: NSA-2150-FWEX-E Firmware Versions: [removed]and[removed]FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-19 13:43:31
619Computing / Cyberwarfare / FIPS 140 / OpenVPN / Zeroisation / Cryptography standards / Computer security / Computer network security

FIPS[removed]SECURITY POLICY FOR: INZERO GATEWAY MODULE VERSION: XB2CUSB3.1 INZERO SYSTEMS Firmware Version[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-02 15:21:29
620Medical informatics / Nursing informatics / International standards / Standards organizations / EHNAC / Accreditation / Interoperability / Electronic health record / Nationwide Health Information Network / Health / Medicine / Health informatics

Collaborating to Build the Security and Trust Framework for Directed Exchange[removed] Responses to Questions for the HIT Policy Committee’s Interoperability and HIE Workgroup Governance Subgroup Hearin

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-08-22 08:58:36
UPDATE