Network security policy

Results: 1254



#Item
691Internet protocols / Internet standards / Security / Network architecture / Computer security / Remote access policy / Layer 2 Tunneling Protocol / Virtual private network / Access control / Computer network security / Computing / Internet

Microsoft Word - SANS Policy Top 10.docx

Add to Reading List

Source URL: cias.utsa.edu

Language: English - Date: 2014-02-26 09:51:00
692Health / Food politics / Poverty / United Nations Development Group / Development studies / Hunger / World Food Programme / Food security / Malnutrition / Development / Food and drink / Humanitarian aid

Number 2, April[removed]Development Works Bread for the World Institute provides policy analysis on hunger and strategies to end it. The Institute educates its network,

Add to Reading List

Source URL: www.bread.org

Language: English - Date: 2013-12-17 13:40:40
693Development / Climate change policy / Food security / Humanitarian aid / United Nations Climate Change Conference / Famine / Copenhagen Accord / Hunger / Agriculture / Environment / United Nations Framework Convention on Climate Change / Food politics

Food Justice Network Volume 10, No.1 March 2010 UPDATE The Food Justice Network is a community of supporters, staff and members of Canadian

Add to Reading List

Source URL: foodgrainsbank.ca

Language: English - Date: 2010-04-07 17:54:48
694Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Security controls / Vulnerability / Chief information security officer / Security / Computer security / Data security

Policy Summary No. 14 Working From Home Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/cio/informationsecurity

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-27 20:53:20
695Computer network security / Computer security / Crime prevention / National security / Secure communication / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Government / Computer crimes / Security / Public safety

UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

Add to Reading List

Source URL: newamerica.net

Language: English - Date: 2014-07-11 18:17:24
696National security / Computer security / Computer network security / Information security / Criminal Justice Information Services Division / Password / Federal Bureau of Investigation / Access control / Security guard / Security / Public safety / Crime prevention

Physical Protection Policy Policy Title: Physical Protection Policy Effective Date: Revision Date: Every 2 years or as needed

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2013-11-08 15:24:31
697Computing / Public safety / Email / System administration / Password / Computer network security / University of Texas–Pan American / Information security / Security token / Security / Crime prevention / National security

INFORMATION RESOURCES ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.utpa.edu

Language: English - Date: 2014-05-06 21:01:17
698Computing / Crime prevention / National security / Computer security / X Window System / DMZ / Access control / Security / Computer network security / Software

Microsoft Word - SANS Policy Checklist.docx

Add to Reading List

Source URL: cias.utsa.edu

Language: English - Date: 2014-02-26 09:50:58
699Companies listed on the New York Stock Exchange / Cyberwarfare / Computing / Computer network security / Threat / McAfee VirusScan / Host Based Security System / McAfee / Antivirus software / Computer security

Data Sheet McAfee Embedded Control System integrity, change control, and policy compliance in one solution Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:37:47
700Computer security / Internet privacy / Electronic commerce / Crime prevention / National security / Intranet / Extranet / Password / Vulnerability / Computing / Computer network security / Security

Acceptable Use Policy 1.0 Overview The intention for publishing an Acceptable Use Policy is not to impose restrictions that are contrary to established culture of openness, trust, and integrity. Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2013-11-08 15:18:04
UPDATE