Security assurance

Results: 2582



#Item
801United States government secrecy / High Assurance Internet Protocol Encryptor / Contract law / Sectéra Secure Module / General Dynamics / Warranty / Maintenance /  repair /  and operations / TACLANE / Cryptographic protocols / Cyberwarfare / Computer network security

Microsoft Word - TACLANE-Micro_10docx

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2015-04-21 05:07:23
802Nuclear warfare / Arms control / Nuclear Non-Proliferation Treaty / Weapons of mass destruction / International Atomic Energy Agency / 13 steps / United Nations Security Council Resolution 984 / Nuclear disarmament / Security assurance / International relations / Nuclear proliferation / Nuclear weapons

http://disarmament.un.org/wmd/npt/1995dec2.htm

Add to Reading List

Source URL: www.reachingcriticalwill.org

Language: English - Date: 2012-03-23 12:45:59
803Audit / Business / Auditing / Accreditation / Quality assurance

ACCREDITATION RULE 24 Issue Date: Implementation Date: Supersedes: SUBJECT: Accreditation Program for Supply Chain Security Management Systems (SCSMS) APPLIES TO: ISOSCSMS ANAB-Acc

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2015-01-02 19:53:08
804Security / Accidents / Failure / Safety assurance / Systems science / Occupational safety and health / Flight operations quality assurance / Risk / Safety engineering / Safety

FDM Challenges in a ACMI Specialized Airline 3rd European Operators FDM Forum Cologne, February 2014 by Hugo Alves (FDM Analyst)

Add to Reading List

Source URL: easa.europa.eu

Language: English - Date: 2014-04-13 15:28:52
805Global Information Assurance Certification / Standards / Penetration test / CompTIA / Cisco Career Certifications / Microsoft Certified Professional / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: ciwcertified.com

Language: English - Date: 2011-09-19 16:21:10
806Business / Formal methods / Software project management / Software testing / Software quality / Quality assurance / Software development process / Software engineer / Software security assurance / Software engineering / Software development / Computing

Research Report on “Development of a Certification Roadmap for IT Professional Certification” Project Appendix B – Competency Standards Matrix B.1 Suggested requirements for relevant working experience needed to a

Add to Reading List

Source URL: www.hkcs.org.hk

Language: English - Date: 2012-03-12 00:22:40
807Accreditation / Ethics / Thought / Computer security / Data security / Higher education accreditation / Quality assurance / Evaluation / Professional certification

Advice from the Higher Education Standards Panel to TEQSA regarding the application of the Higher Education Standards Framework for regulatory purposes This advice is provided to TEQSA in accordance with Section 168 (1b)

Add to Reading List

Source URL: www.hestandards.gov.au

Language: English - Date: 2014-12-18 23:08:49
808Information technology audit / Certified Public Accountant / Accountant / Institute of Internal Auditors / Professional certification / Assurance services / Internal audit / Audit / Certified Information Systems Auditor / Auditing / Accountancy / Business

Peter Koo National Leader of Security, Privacy, and Resiliency Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Peter Koo is one of the Practice Builders of our Enterprise Risk Services (Risk Management

Add to Reading List

Source URL: www.hkngis.hk

Language: English - Date: 2013-09-20 01:58:27
809Nuclear technology / Nuclear Non-Proliferation Treaty / Nuclear weapons convention / Nuclear disarmament / NPT Review Conference / Weapons-grade / Comprehensive Nuclear-Test-Ban Treaty / Security assurance / Reactor-grade plutonium / International relations / Nuclear weapons / Nuclear proliferation

Abolishing All Nuclear Weapons Necessary, feasible and increasingly urgent Dr John Gee Memorial Lecture Canberra 28 October 2009 Ladies and gentlemen …. I am honoured to be asked to give this third John Gee Memorial Le

Add to Reading List

Source URL: www.unimelb.edu.au

Language: English - Date: 2011-10-03 23:50:10
810Risk management / Identity management / Computer security / Evaluation / Data security / Information security / Information Technology Infrastructure Library / Credential / Identity assurance / Security / Risk / Ethics

Identity and Access Management Worksheet Name of service being assessed: Name of reviewer: _________________________________ Date: ____________________________________ Agency: ___________________________________________

Add to Reading List

Source URL: www.egovernment.tas.gov.au

Language: English - Date: 2010-01-18 18:49:42
UPDATE