Security controls

Results: 2560



#Item
31Integrating the Healthcare Enterprise  5 10

Integrating the Healthcare Enterprise 5 10

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2008-10-24 17:11:46
32U.S. CONSUMER PRODUCT SAFTEY COMMISSION  OFFICE OF INSPECTOR GENERAL FY 2015 FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW REPORT

U.S. CONSUMER PRODUCT SAFTEY COMMISSION OFFICE OF INSPECTOR GENERAL FY 2015 FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW REPORT

Add to Reading List

Source URL: www.cpsc.gov

Language: English
33An Introduction to NIST Special Publicationfor Higher Education Institutions

An Introduction to NIST Special Publicationfor Higher Education Institutions

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-18 11:38:08
34TACSS TAPA Air Cargo Security Standards Version: Forward Transported Asset Protection Association is an association of security professionals and related business

TACSS TAPA Air Cargo Security Standards Version: Forward Transported Asset Protection Association is an association of security professionals and related business

Add to Reading List

Source URL: www.tapaemea.org

Language: English - Date: 2014-08-05 08:30:46
35th  Drives& Controls  THE LEADING MAGAZINE

th Drives& Controls THE LEADING MAGAZINE

Add to Reading List

Source URL: www.drivesncontrols.com

Language: English - Date: 2015-12-15 05:14:09
36Genesis Hosting Solutions, LLC Data Center Security and Reliability Controls  Genesis Hosting Solutions’ equipment is collocated at an XO Communications facility downtown Chicago, at 140 S. Dearborn St (the Marquette B

Genesis Hosting Solutions, LLC Data Center Security and Reliability Controls Genesis Hosting Solutions’ equipment is collocated at an XO Communications facility downtown Chicago, at 140 S. Dearborn St (the Marquette B

Add to Reading List

Source URL: www.genesishosting.com

Language: English - Date: 2009-03-17 20:50:02
37The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36
38WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:59
39Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
40

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:18