Security controls

Results: 2560



#Item
41NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.CApril 14, 2016

NASA OFFICE OF INSPECTOR GENERAL OFFICE OF AUDITS SUITE 8U71, 300 E ST SW WASHINGTON, D.CApril 14, 2016

Add to Reading List

Source URL: oig.nasa.gov

Language: English - Date: 2016-04-14 10:02:51
42Office of the Inspector General Patrick J. Maley Review of Preventative Controls for Fraud, Waste, and Abuse in the Supplemental Nutrition Assistance Program

Office of the Inspector General Patrick J. Maley Review of Preventative Controls for Fraud, Waste, and Abuse in the Supplemental Nutrition Assistance Program

Add to Reading List

Source URL: oig.sc.gov

Language: English - Date: 2016-07-01 14:15:02
43NetOps / Military communications / LandWarNet / Interoperability / Computing / Technology / Military

Cryptographic Management Cryptographic Security Services are measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications.

Add to Reading List

Source URL: netcom.army.mil

Language: English - Date: 2009-10-26 18:02:18
44Microsoft Word - Vendor Compliance Program (VCP) (v2016.1)

Microsoft Word - Vendor Compliance Program (VCP) (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:13
45

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:05
46Safeguarding of Unclassified Controlled Technical Information (UCTI) Understanding and Complying with the Defense Federal Acquisition Regulation Supplement Clause  Cybersecurity attacks continue to increase

Safeguarding of Unclassified Controlled Technical Information (UCTI) Understanding and Complying with the Defense Federal Acquisition Regulation Supplement Clause Cybersecurity attacks continue to increase

Add to Reading List

Source URL: www.boeingsuppliers.com

Language: English - Date: 2014-10-24 21:08:52
47Independent Security Assessment Criteria Phase – I Version 1.1, datedFor: {Organization name} Performed on: {Date of Assessment}

Independent Security Assessment Criteria Phase – I Version 1.1, datedFor: {Organization name} Performed on: {Date of Assessment}

Add to Reading List

Source URL: www.calguard.ca.gov

Language: English - Date: 2016-07-18 16:29:13
48Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
49BACKGROUND CHECK  X Security Services of CT, Inc. 25 Controls Drive, Shelton, CT 06484

BACKGROUND CHECK X Security Services of CT, Inc. 25 Controls Drive, Shelton, CT 06484

Add to Reading List

Source URL: www.southernct.edu

Language: English - Date: 2016-03-15 10:06:01
50SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015

SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015

Add to Reading List

Source URL: www.macstadium.com

Language: English - Date: 2016-04-25 16:34:29