Security assurance

Results: 2582



#Item
551Cyberwarfare / Computer network security / Risk management / Security controls / Information security / Vulnerability / Information assurance / Security risk / Risk management framework / Computer security / Security / Data security

Community Gold Standard Version 2.0 National Security Agency/Central Security Service INFORMATION

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-03-31 20:38:56
552United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
553Electronic authentication / Security token / Authentication / Access control / Credential / Identity assurance / Two-factor authentication / Identity management / Security / Identity

Considerations for Identity Management in Public Safety Networks

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-03-30 13:45:20
554Deloitte / Vulnerability / Insider / Threat / Information assurance / Computer security / Cyberwarfare / Computing

Top 10 considerations for building an insider threat mitigation program Introduction Organizations continue to face a variety of insider threats,

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
555Nuclear weapons / Fissile Material Cut-off Treaty / Conference on Disarmament / Nuclear Non-Proliferation Treaty / NPT Review Conference / Nuclear disarmament / Comprehensive Nuclear-Test-Ban Treaty / Disarmament / Security assurance / International relations / Nuclear proliferation / Arms control

Reaching Critical Will’s GUIDE TO THE CONFERENCE ON DISARMAMENT 2010

Add to Reading List

Source URL: www.reachingcriticalwill.org

Language: English - Date: 2012-02-05 10:13:43
556Evaluation / Computer security / Computer network security / Quality assurance / Software assurance / Vulnerability / Software security assurance / Penetration test / Application security / Software testing / Software quality / Cyberwarfare

Software Assurance Metrics And Tool Evaluation Las Vegas, Nevada, USA, June 27-30, 2005 P. E. Black Information Technology Laboratory

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:58
557Computer network security / Public-key cryptography / Password / Internet security / Rootkit / Man-in-the-middle attack / Secure Shell / Security and safety features new to Windows Vista / Skype security / Cryptography / Cyberwarfare / Computer security

STANDARD FOR PRODUCT SECURITY ASSURANCE STM-0117 for General Use, Twelfth Edition STM-0117 for General Use Terms of Use:

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-07-31 21:23:02
558Security / Computer security / Identity assurance / Access control / National Strategy for Trusted Identities in Cyberspace / OpenID / Digital identity / Internet privacy / Authentication / Identity / Identity management / Federated identity

CTO Corner November 2012 Identity Ecosystem: Path to Payments and More Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:11
559Global Information Assurance Certification / Standards / Penetration test / CompTIA / Microsoft Certified Professional / Cisco Career Certifications / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www.ciwcertified.com

Language: English - Date: 2011-05-20 13:18:12
560Standards / Access control / Credential / Smart card / Identity document / Biometrics / Identity assurance / Identity theft / Authentication / Security / Identity management / FIPS 201

Microsoft Word - NextgenID_West_Virginia_080914_wp

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2014-10-22 12:29:00
UPDATE