Security assurance

Results: 2582



#Item
111Computer network security / Global Information Assurance Certification / SANS Institute / Computer security / Intrusion detection system

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-08-20 16:00:38
112Economy / Finance / Money / Funds / Government investment pool / Money market fund / Real estate investment trust / Bond / Security / Mutual fund / U.S. Securities and Exchange Commission / Investment

ApprovedABAG PLAN Corp. Investment Policy Association of Bay Area Governments Pooled Liability Assurance Network Investment Policy

Add to Reading List

Source URL: plan.abag.ca.gov

Language: English - Date: 2013-03-19 19:27:05
113

Technical Assessment and Assurance Practice Specialist IT security services including, threat analysis, vulnerability assessment and solution design The world is changing at pace, and so too are the

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2015-01-12 00:59:37
    114

    Information Assurance and Security Letters. ISSNVolumepp. XXX-XXX © MIR Labs, www.mirlabs.net/iasl/index.html The Virtual Machine Log Auditor Sean Thorpe1, Indrajit Ray2 Tyrone Grandison3 Abbie Barb

    Add to Reading List

    Source URL: www.tyronegrandison.org

    Language: English - Date: 2013-04-16 18:51:46
      115

      Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

      Add to Reading List

      Source URL: www1.spms.ntu.edu.sg

      Language: English - Date: 2015-10-05 00:19:26
        116Identity management / Computer security / Computer access control / Identity / Federated identity / Identity assurance / Authentication / Multi-factor authentication / Knowledge-based authentication / Identity document / Electronic authentication / Identity score

        White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

        Add to Reading List

        Source URL: lexisnexis.com

        Language: English - Date: 2014-10-15 08:44:03
        117

        Software Assurance Implementing an SA Program at a Security Software Company Mark S. Kadrich, CISSP Senior Principle, End Point Protection

        Add to Reading List

        Source URL: sysa.omg.org

        Language: English - Date: 2009-01-26 14:44:40
          118Software quality / Quality assurance / Software assurance / Process management / IEEE standards / Management / Concept of operations / Vulnerability / Computer security / Critical infrastructure protection

          Mitch.Komaroff.CONOPS Nov 06 Overview.ppt

          Add to Reading List

          Source URL: swa.omg.org

          Language: English - Date: 2006-12-14 08:55:32
          119

          Information Assurance Consulting Services Performance-Based Approach to Information Security Guarding against the loss or disclosure of confidential information is a necessity, as is the need for compliance and adherence

          Add to Reading List

          Source URL: www.seccuris.com

          Language: English
            120

            THE COST OF CYBER CRIME. A DETICA REPORT IN PARTNERSHIP WITH THE OFFICE OF CYBER SECURITY AND INFORMATION ASSURANCE IN THE CABINET OFFICE.

            Add to Reading List

            Source URL: www.gov.uk

            Language: English - Date: 2013-01-16 14:54:42
              UPDATE