Security assurance

Results: 2582



#Item
581Data security / National security / Government of the United Kingdom / Information sensitivity / Information assurance / Information security / Security Policy Framework / CESG Listed Advisor Scheme / ISO/IEC 27001 / Security / Computer security / Information Risk Management

NRS Statement on Information Assurance E016 Location: 3 of 6 Last saved date: [removed]Version 1.0

Add to Reading List

Source URL: www.nrscotland.gov.uk

Language: English - Date: 2013-12-08 11:12:02
582ISO/IEC 27001 / Computing / Management system / Quality assurance / ISO/IEC 20000 / Information Technology Infrastructure Library / Information security management system / ISO/IEC 27000-series / Skills Framework for the Information Age / Information technology management / Quality management / Management

IT Service Delivery and Quality Management Systems Two-day short course Course content A quality management system and quality

Add to Reading List

Source URL: www.acs.org.au

Language: English - Date: 2013-11-21 00:57:40
583Nuclear Non-Proliferation Treaty / United Nations Security Council Resolution / NPT Review Conference / Security assurance / Nuclear Security Summit / Weapon of mass destruction / International relations / Nuclear weapons / Nuclear proliferation

U– Security Council Security Council Resolution[removed]Determined to facilitate henceforth an effective response to global threats in the area of non-proliferation,

Add to Reading List

Source URL: www.kcl.ac.uk

Language: English - Date: 2015-03-03 08:45:17
584Nuclear technology / Areva / Security / Crime prevention / National security / Validation / Verification and validation / Quality assurance / Computer security / Pharmaceutical industry / Validity / Technology

Cyber Security Engineering Did you know…AREVA offers a diverse team of cyber security engineering resources as an extension of your team? And we understand that the real success is in an ongoing relationship — one wh

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-03-17 14:23:31
585Nuclear warfare / Arms control / Nuclear strategies / Nuclear Non-Proliferation Treaty / Nuclear disarmament / Nuclear proliferation / Anti-nuclear movement / Disarmament / Security assurance / International relations / Nuclear weapons / International security

The Nuclear Bomb: A weapon in search of a target By Alyn Ware New Zealand International Review July/August[removed]In 1993 the US and Russia removed each other from their nuclear targets list. The retargeting of their

Add to Reading List

Source URL: lcnp.org

Language: English - Date: 2012-07-03 12:29:24
586Quality Assurance Agency for Higher Education / Quality assurance / Computing / Data Protection Act / Identity document / Email / Public key certificate / Cryptography / Security / Higher education in the United Kingdom

Making a subject access request - guidance Section 7 of the Data Protection Act 1998 states that a "data subject" (the person about whom the personal data refers) is entitled, upon written request, to be informed (subjec

Add to Reading List

Source URL: www.qaa.ac.uk

Language: English - Date: 2014-06-11 09:23:36
587Data security / Cryptography standards / Computer network security / United States government secrecy / Security controls / FIPS 140-2 / Open Source Software Institute / OpenSSL / Global Information Assurance Certification / Security / Computer security / Computing

Global Information Assurance Certification Paper This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Copyright SANS Institute Author Retai

Add to Reading List

Source URL: www.oss-institute.org

Language: English - Date: 2012-10-17 10:57:26
588Public safety / Cisco Systems / Deep packet inspection / Videotelephony / Computing / Information security / Computer security / Security / Crime prevention / National security

Policy Assurance Monitoring for IoE Cisco IT Insights What As Cisco prepares for the proliferation of devices within the concept of the Internet of Everything (IoE), Cisco IT is focusing on implementing backbone technolo

Add to Reading List

Source URL: www.cisco.com

Language: English
589Software testing / Source code / Hacking / Vulnerability / Continuous integration / Software bug / Debian / Software quality / Quality assurance / Software development / Computing / Software

Source Code Analysis Made Easy The AppSec How-To Guide: Getting your Developers to Beg for Security Security is fascinating. It touches each and every one of us – whether we’re making an online credit card purchase,

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:11:04
590Ethics / Thought / Protection Profile / Public key certificate / Validation / Evaluation Assurance Level / Common Criteria Testing Laboratory / National Information Assurance Partnership / Evaluation / Computer security / Common Criteria

ARRANGEMENT on the Recognition of Common Criteria Certificates In the field of

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
UPDATE