Security assurance

Results: 2582



#Item
921Computing / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Hardware security module / BIND / DNS root zone / Name server / Domain name system / Internet / Network architecture

www.t hales-esecurity.com THALES DELIVERS HIGH ASSURANCE SIGNING SOLUTION TO ENHANCE SECURITY FOR BIND • Mitigate threats to the DNS by implementing ISC BIND support for DNSSEC

Add to Reading List

Source URL: www.isc.org

Language: English - Date: 2014-04-14 17:03:52
922EJBCA / Java enterprise platform / Public-key cryptography / Key management / Data security / Common Criteria / Evaluation Assurance Level / Digital signature / Biometric passport / Cryptography / Evaluation / Security

PrimeKey PRIMEKEY SOLUTIONS AB INNOVATIVE SOFTWARE NETWORKING CONFERENCE  Admir Abdurahmanovic VP, co-founder

Add to Reading List

Source URL: www.swii.org

Language: English - Date: 2014-09-23 14:56:34
923United States Department of Energy / Quality assurance / United States / Government procurement in the United States / United States administrative law / National Nuclear Security Administration

NNSA Policy Letter: NAP-4B Date: June 30,2008 TITLE: Corporate Performance Evaluation Process for M&O Contractors

Add to Reading List

Source URL: nnsa.energy.gov

Language: English - Date: 2013-08-21 10:47:45
924Internal control / SOX 404 top–down risk assessment / Auditing / Risk / Security

Microsoft Word - DNV Business Assurance - Anna Turrell[removed]docx

Add to Reading List

Source URL: business-humanrights.org

Language: English - Date: 2014-06-30 12:04:13
925Method engineering / Evaluation / Quality assurance / Information Technology Infrastructure Library / Information security / Infrastructure / Public safety / Prevention / Standards / Information technology management / Security

TAXUD/R4-R5 – INVITATION TO TENDER TAXUD/2010/AO-13 TAXUD ITSM2 - TERMS OF REFERENCE COVER REF: TAXUD-ITSM2

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2011-10-03 10:33:33
926Data security / Accreditation / ISO/IEC 27006 / ISO/IEC 27001 / Conformity assessment / Information security management system / Information technology management / National Accreditation Board for Testing and Calibration Laboratories / ISO/IEC 17025 / Evaluation / Quality assurance / Standards

DOC Document

Add to Reading List

Source URL: www.apec-pac.org

Language: English - Date: 2013-01-01 20:08:23
927Computer network security / Crime prevention / National security / Data security / Vulnerability / Software assurance / Application security / Software quality / Software development process / Security / Cyberwarfare / Computer security

Addressing Software Security in the Federal Acquisition Process Cigital Federal, Inc. 14 January 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
928ISO standards / Computer security / Altran Praxis / Evaluation Assurance Level / National Security Agency / Common Criteria / Copyright law of the United States / Integrity / Smart card / Evaluation / Ethics / Security

p Industrial case study: Zero defect secure software for the National Security Agency

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:08
929Computer network security / Software quality / OWASP / Software testing / Application security / Vulnerability / Software security assurance / Software assurance / Threat model / Cyberwarfare / Computer security / Security

OWASP SAMM Best Practices, Lessons from the Trenches Seba Deleersnyder [removed] OpenSAMM project co-leader

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:46:23
930Tenable Network Security / Nessus / Information assurance vulnerability alert / Defense Information Systems Agency / Security Content Automation Protocol / Vulnerability management / Federal Information Security Management Act / Vulnerability scanner / Vulnerability / Computer security / Cyberwarfare / Computing

| CASE STUDY Tenable Delivers Best-of-Breed Configuration Compliance and Vulnerability Management for U.S. Department of Defense

Add to Reading List

Source URL: www.tenable.com

Language: English - Date: 2013-08-22 14:20:24
UPDATE