Security assurance

Results: 2582



#Item
911ISO/IEC 27006 / Accreditation / Computing / Information security management system / International Organization for Standardization / Technology / ISO/IEC 27000-series / ISO/IEC 27002 / Evaluation / ISO/IEC 27001 / Quality assurance

Survey on ISMS accreditation scope Section 1: AB and CB members who operate ISMS accreditation or certification service under ISO/IEC 27001:2005 and ISO/IEC 27006:2007 Q1: Do you have or have you observed any classifica

Add to Reading List

Source URL: www.apec-pac.org

Language: English - Date: 2012-08-05 19:47:44
912Security / Penetration test / Attack / Timing attack / Computer network security / Cyberwarfare / Computer security

INCIDENT RESPONSE & INVESTIGATION SERVICES • PENETRATION TESTING • SECURITY RESEARCH • SOFTWARE ENGINEERING SECURITY ASSURANCE • SECURITY ARCHITECHTURE & DESIGN ASSURANCE • TRAINING Pixel Perfect Timing Attacks

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-03 09:26:33
913Public economics / IRS tax forms / Income tax in the United States / Political economy / Tax return / Tax preparation / Individual Taxpayer Identification Number / Earned income tax credit / Canada Revenue Agency / Taxation in the United States / Internal Revenue Service / Government

Accuracy of Tax Returns, the Quality Assurance Processes, and Security of Taxpayer Information Remain Problems for the Volunteer Program

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2011-09-21 08:28:21
914Internal audit / Internal control / Common Criteria / Business / Audit / Quality assurance / Integrated reporting / Risk / Information security professionalism / Auditing / Evaluation / Corporate governance

The Japanese Institute of Certified Public Accountants[removed]Kudan-Minami, Chiyoda-ku, Tokyo[removed], Japan Phone: [removed]Fax: [removed]Email: [removed]

Add to Reading List

Source URL: www.theiirc.org

Language: English - Date: 2014-12-17 05:14:41
915Data security / Software testing / Computer network security / National security / Information security management system / Application security / Vulnerability / Threat model / Security testing / Computer security / Security / Cyberwarfare

Be ta SOFTWARE ASSURANCE MATURITY MODEL V0.8 BETA

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
916Arms control / NPT Review Conference / Middle Powers Initiative / Nuclear disarmament / Security assurance / Disarmament / Weapon of mass destruction / Nuclear Non-Proliferation Treaty / New Agenda Coalition / International relations / Nuclear weapons / Nuclear proliferation

Microsoft Word - MPI statement to UNSC.doc

Add to Reading List

Source URL: www.middlepowers.org

Language: English - Date: 2013-02-21 13:20:17
917Data security / Software quality / Software testing / Information security management system / Software security assurance / Software assurance / Vulnerability / Application security / Quality assurance / Security / Computer security / Cyberwarfare

Software Assurance Maturity Model A guide to building security into software development Version - 1.0 For the latest version and additional info, please see the project web site at

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
918Data security / Software testing / Computer network security / National security / Information security management system / Application security / Vulnerability / Threat model / Security testing / Computer security / Security / Cyberwarfare

Be ta SOFTWARE ASSURANCE MATURITY MODEL V0.8 BETA

Add to Reading List

Source URL: www.opensamm.org

Language: English - Date: 2010-08-18 10:28:34
919Arms control / Nuclear warfare / NPT Review Conference / 13 steps / New Agenda Coalition / Nuclear disarmament / Comprehensive Nuclear-Test-Ban Treaty / Middle Powers Initiative / Security assurance / International relations / Nuclear proliferation / Nuclear weapons

Microsoft Word - 05_06_09_HS.doc

Add to Reading List

Source URL: www.middlepowers.org

Language: English - Date: 2013-02-21 13:24:30
920Computer network security / United States Department of Homeland Security / Hacking / National security / National Cyber Security Division / Vulnerability / Software assurance / Conficker / Attack / Computer security / Cyberwarfare / Security

Commerce National Defense Public/Private Collaboration Efforts for Software Supply Chain Risk Management

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:44
UPDATE