Security assurance

Results: 2582



#Item
421Auditing / Security / Information technology audit / Standards / Software testing / Penetration test / Information Systems Audit and Control Association / Certified Information Security Manager / Information security management / Computer security / Data security / Computing

CESG Certified Professional Scheme – qualification requirements For practitioner applications we require proof of a relevant information assurance certification. A copy of your certificate must be provided along with y

Add to Reading List

Source URL: certifications.bcs.org

Language: English - Date: 2014-10-01 04:18:04
422Crime prevention / National security / Computer network security / Data security / Vulnerability / McAfee / Information assurance / System administrator / Information technology specialist / Computer security / Computing / Security

Network Security Officer (Security Specialist 2) Title: Location: Reports to:

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-09-17 01:03:22
423Auditing / Management / Project management / Risk management / Audit / TRAC / Assurance services / Prevention / Security / Business / Actuarial science

Case Study: Commercial Loan Document Firm Must Provide Security Assurance to Large Customers (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc.

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:38
424Safelayer Secure Communications / Requirement / Protection Profile / Security Target / Inigo / Action / Computing / Thought / Evaluation / Evaluation Assurance Level / Software requirements

Presentación de PowerPoint

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:08
425Security / Ethics / Common Criteria / National Information Assurance Partnership / Evaluation Assurance Level / ECO / Evaluation / Computer security / Protection Profile

National Information Assurance Program Common Criteria Evaluation and Validation Scheme

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:44
426United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
427Nuclear Non-Proliferation Treaty / Nuclear disarmament / NPT Review Conference / Fissile Material Cut-off Treaty / Weapon of mass destruction / Comprehensive Nuclear-Test-Ban Treaty / Nuclear Security Summit / Security assurance / Nuclear-weapon-free zone / International relations / Nuclear proliferation / Nuclear weapons

Center for the Promotion of Disarmament and Non-Proliferation The Japan Institute of International Affairs Executive Summary

Add to Reading List

Source URL: www.pref.hiroshima.lg.jp

Language: English - Date: 2015-04-14 02:53:12
428National security / Public safety / Data security / Anti-pattern / Application security / Information security / Problem frames approach / Software security assurance / Security / Computer security / Crime prevention

Information Security Antipatterns in Software Requirements Engineering Miroslav Kis, Ph.D., CISSP, Member IEEE Abstract Requirements engineering is one of the key activities in

Add to Reading List

Source URL: www.hillside.net

Language: English - Date: 2004-02-16 17:18:41
429Software engineering / Computer security / Crime prevention / National security / Software assurance / Software Engineering Institute / Application security / Software development process / Vulnerability / Security / Computing / Software quality

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:46:06
430Computer network security / Crime prevention / National security / Secure communication / Common Criteria / Evaluation / Computer security / Security

Alternative Assurance Criteria Dr. David Brewer Gamma Secure Systems Limited www.gammassl.co.uk

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:32
UPDATE