Security Technical Implementation Guide

Results: 43



#Item
31Department of Defense Information Assurance Certification and Accreditation Process / Critical infrastructure protection / Assistant Secretary of Defense for Networks and Information Integration / Information assurance / Security controls / Popular Socialist Party of Mexico / Defense Technical Information Center / Defense Information Systems Agency / Security Technical Implementation Guide / Computer security / National security / Security

DoD Instruction[removed], May 28, 2014

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2014-05-28 15:21:40
32Public safety / Information security / Prevention / Computer security / Security / Security Technical Implementation Guide

Recommended Security Checklists, January2010

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:28:43
33Public safety / Information security / Prevention / Computer security / Security / Security Technical Implementation Guide

Recommended Security Checklists, January2010

Add to Reading List

Source URL: iss.unm.edu

Language: English - Date: 2011-04-27 12:06:03
34Security Content Automation Protocol / Federal Information Security Management Act / Security controls / Risk management framework / Information security / Security Technical Implementation Guide / Configuration management / Vulnerability / Security risk / Computer security / Security / Computing

MONITOR STEP FAQS NIST RISK MANAGEMENT FRAMEWORK C ontinuous monitoring programs allow an organization to maintain the security authorization of an

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-13 01:00:00
35Computer-mediated communication / Integrated Services Digital Network / Internet protocol suite / Network address translation / Voice over IP / Videoconferencing / H.323 / Videotelephony / Electronic engineering / Electronics

VIDEO TELE-CONFERENCE SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 1, Release 1 8 January 2008

Add to Reading List

Source URL: www.freeporttech.com

Language: English - Date: 2010-11-29 10:16:37
36Access control / Password strength / Password / Passphrase / Crypt / Password manager / OTPW / Security / Computer security / Cryptography

University of Nebraska Password Policy Technical Implementation Guide University of Nebraska

Add to Reading List

Source URL: csn.nebraska.edu

Language: English - Date: 2014-03-03 10:11:05
37Cyberwarfare / Crime prevention / National security / Data security / Application security / Password / Security Technical Implementation Guide / SQL injection / Security controls / Computer security / Security / Computer network security

 APPLICATION SECURITY AND DEVELOPMENT SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 3, Release 5

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2013-11-07 23:27:12
38United Nations Security Council / International conventions on terrorism / Al-Qaeda / Taliban / United Nations Security Council Counter-Terrorism Committee / Money laundering / Definitions of terrorism / Financial Action Task Force on Money Laundering / International Convention for the Suppression of the Financing of Terrorism / Financial regulation / International relations / Law

Technical guide to the implementation of Security Council resolution[removed] Compiled by the Counter-Terrorism Committee Executive Directorate

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2012-10-16 17:04:09
39Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:22
UPDATE