Security Technical Implementation Guide

Results: 43



#Item
21Open Vulnerability and Assessment Language / Vulnerability / Information assurance vulnerability alert / Critical infrastructure protection / Defense Information Systems Agency / Information assurance / Security Technical Implementation Guide / Information security / Federal Information Security Management Act / Computer security / Security / Cyberwarfare

Transformational Vulnerability Management Through Standards Robert A. Martin MITRE Corporation

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 14:03:27
22Information technology management / Computer network security / OWASP / Credit cards / Application security / Security Technical Implementation Guide / Payment Card Industry Data Security Standard / Computer security / Electronic commerce / Security

How can a small business handle all the requirements that the Department of Defense imposes? SANS AppSec Summit 2012

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
23Information technology management / Computer network security / OWASP / Credit cards / Application security / Security Technical Implementation Guide / Payment Card Industry Data Security Standard / Computer security / Electronic commerce / Security

How can a small business handle all the requirements that the Department of Defense imposes? SANS AppSec Summit 2012

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
24Security Technical Implementation Guide / Mobile device management / Common Criteria / Communications security / Protection Profile / National Information Assurance Partnership / Security / Computer security / Cyberwarfare / Configuration management

Microsoft Word - U_DoD_MDM_PP_Annex_V1R1_TBD1.docx

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-25 12:12:21
25Configuration management / Security Technical Implementation Guide / Information technology management / Security / Computer security / Computer network security

UNCLASSIFIED DoD Annex for Mobile Device Fundamentals (MDF) Protection Profile Version 1, Release 1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-03 09:57:46
26Cyberwarfare / Defense Information Systems Agency / Security Technical Implementation Guide / Security controls / Information security / Cloud computing / United States Department of Defense / EMASS / Computer security / Security / Computing

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1

Add to Reading List

Source URL: iase.disa.mil

Language: English - Date: 2015-01-13 16:47:37
27Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Technical Brief Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2014-12-13 18:32:35
28System software / Computing / WhatsUp Gold / Ipswitch /  Inc. / Backup / Simple Network Management Protocol / Configuration management / Security Technical Implementation Guide / Deep configuration assessment / Information technology management / Network management / System administration

WhatsUp-Gold-Logo-Tagline-CMYK

Add to Reading List

Source URL: www.whatsupgold.com

Language: English - Date: 2013-08-07 15:25:26
29Configuration management / Security Technical Implementation Guide / Information technology management / Security / Computer security / Computer network security

UNCLASSIFIED DoD Annex for Mobile Device Fundamentals (MDF) Protection Profile Version 1, Release 1

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-02-18 15:13:48
30National security / United States Department of Defense / Defense Information Systems Agency / Public safety / Security controls / Security Technical Implementation Guide / Information security / EMASS / Department of Defense Strategy for Operating in Cyberspace / Computer security / Security / Data security

DRAFT DEPARTMENT OF DEFENSE (DOD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 0.36

Add to Reading List

Source URL: iase.disa.mil

Language: English - Date: 2014-12-08 11:48:32
UPDATE