Security assurance

Results: 2582



#Item
201Computer security / Evaluation / Software bugs / Common Criteria / Reliability engineering / Bug tracking system / Vulnerability / Software development process / Usability / Software testing / Software development / Software quality

Chapter 23: System Evaluation and Assurance C H A P TE R 23 System Evaluation and

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
202United States Department of Homeland Security / Quality assurance / Nims / Accreditation

Contact: Catherine L. Ross Director of Accreditation

Add to Reading List

Source URL: files.ctctcdn.com

Language: English - Date: 2015-05-26 09:53:26
203Computer security / Crime prevention / National security / Identity assurance / Federated identity management / OpenID / Defense Information Systems Agency / Transglobal Secure Collaboration Project / Security / Identity management / Identity

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
204Privacy of telecommunications / Mass surveillance / Crime prevention / Privacy law / Telephone tapping / National Security Agency / Cryptography / Communications Assistance for Law Enforcement Act / Computer security / National security / Security / Surveillance

PART Three In the final section of the book, I cover three themes: politics, management, and assurance. Given that we now have some idea how to provide protection, the three big questions are: what are you allowed to do

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 09:42:31
205Technology / Accreditation / Quality assurance / Email / Credit card / Card security code / WebEx / American National Standards Institute / Computer-mediated communication / Standards organizations / Computing

ISO/IEC:2015 Transition Training (Online via WebEx) Attendee name       Company      

Add to Reading List

Source URL: anab.org

Language: English - Date: 2015-05-18 12:29:35
206United States federal executive departments / Department of Defense Information Assurance Certification and Accreditation Process / Security controls / Assistant Secretary of Defense for Networks and Information Integration / IUID / Defense Technical Information Center / Mission assurance / Information assurance / Government procurement in the United States / Computer security / United States Department of Defense / Security

DoD Instruction, November 5, 2012

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2012-11-13 14:39:08
207Ethics / Cryptography / Cryptographic software / Software / File sharing networks / Tor / Anonymity / Computer security conference / Peer-to-peer / Internet privacy / Identity management / Social issues

Rob G. Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Avenue SW Washington, DC 20375

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
208Fire marshal / Certification / Firefighter / Accreditation / Public safety / Ethics / Security / Standards / Quality assurance / Professional certification

South Carolina Department of Labor, Licensing, and Regulation South Carolina Fire Academy 141 Monticello Trail • Columbia, SCPhone: • Fax: • www.llronline.com

Add to Reading List

Source URL: scfiremarshal.llronline.com

Language: English - Date: 2015-02-23 08:30:40
209Fire marshal / Certification / Firefighter / Accreditation / Public safety / Ethics / Security / Standards / Quality assurance / Professional certification

South Carolina Department of Labor, Licensing, and Regulation South Carolina Fire Academy 141 Monticello Trail • Columbia, SCPhone: • Fax: • www.llronline.com

Add to Reading List

Source URL: www.scfa.state.sc.us

Language: English - Date: 2015-02-23 08:30:40
210Identity / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Identity provider / Service provider / Authentication / Identity assurance / Identity management / System software / Computer security

GOV.UK Verify Architecture Overview High level architecture overview GOV.UK Verify enables a user to be identified at a service provider with a required  level of assurance, but without revealing any

Add to Reading List

Source URL: alphagov.github.io

Language: English - Date: 2015-06-08 12:02:04
UPDATE