Security level management

Results: 626



#Item
351United States Department of Homeland Security / Incident management / Firefighting in the United States / National Response Framework / Federal Emergency Management Agency / Incident Command System / Dispatcher / National Incident Management System / Emergency management / Public safety / Management

Alabama Training and PSAP Standards Committee Survey Purpose: The purpose of this survey is to establish a training baseline for the State of Alabama that reflects the level of training at each agency that employs

Add to Reading List

Source URL: al911board.com

Language: English - Date: 2014-06-27 16:21:08
352Cryptosystem / Key size / SHA-1 / Data Encryption Standard / FIPS 140-2 / Message authentication code / Advanced Encryption Standard / Public-key cryptography / Transport Layer Security / Cryptography / Key management / Cryptographic hash functions

Securit-e-Doc® SITT® CryptoSystem FIPS[removed]Non-Proprietary Security Policy Level 1 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
353Espionage / FIPS 140 / Hardware security module / Safenet / Conventional PCI / Cryptography / Key management / Cryptography standards / Computing / Computer security

LEVEL 2 NON-PROPRIETARY SECURITY POLICY FOR Luna® PCI 7000 Cryptographic Module (used in devices used in devices Luna® SA, Luna® SP, and Luna® XML and including configurations Key Export with SIM [KES], Cloning [CL],

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-02-10 00:00:00
354Epidemiology / International standards / Crime prevention / National security / Disease surveillance / National Center for HIV/AIDS /  Viral Hepatitis /  STD /  and TB Prevention / Health Level 7 / Surveillance / Notifiable disease / Health / Medicine / Health informatics

Surveillance and Data Management Branch (SDMB) AAPPS Opportunities AAPPS Grantee Meeting June 12, 2014

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2014-09-25 21:26:20
355United States Department of Homeland Security / Incident management / Firefighting in the United States / National Response Framework / Federal Emergency Management Agency / Incident Command System / Dispatcher / National Incident Management System / Emergency management / Public safety / Management

Alabama Training and PSAP Standards Committee Survey Purpose: The purpose of this survey is to establish a training baseline for the State of Alabama that reflects the level of training at each agency that employs Teleco

Add to Reading List

Source URL: al911board.com

Language: English - Date: 2014-05-30 15:46:37
356Active Directory / Service-level agreement / Computer security / Identity management / Lightweight Directory Access Protocol / Virtual directory / Directory services / Computing / System software

Office of Information Technology Services Service Level Agreement Enterprise Directory Services

Add to Reading List

Source URL: www.its.nc.gov

Language: English - Date: 2013-11-18 09:57:53
357FIPS 140-2 / FIPS 140 / Computer hardware / Conventional PCI / Safenet / Cryptography / Key management / Cryptography standards / Computing / Computer security

LEVEL 2 NON-PROPRIETARY SECURITY POLICY FOR Luna® PCI 7000 for Luna® SA, Luna® PCI 7000 for Luna® SP and Luna® PCI 7000 for Luna® XML Cryptographic Modules (includes configurations Key Export with SIM [KES], Clonin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 10:11:20
358Computer security / Cloud computing / Information technology management / Outsourcing / Service-level agreement / Government procurement in the United States / Security / Contract / Data breach / Contract law / Computing / Law

Cloud Computing: Contracting Considerations for Inclusion Pricing: The contract should include specific price caps to eliminate ballooning costs after the initial investment. For example, a fee increase cap of 3% is comm

Add to Reading List

Source URL: www.cpt.unc.edu

Language: English - Date: 2011-06-08 14:31:59
359Computer forensics / Data management / Computer file formats / Archive formats / Data security / File system / Backup / Data recovery / Filesystem-level encryption / System software / Computing / Software

Microsoft Word - $ASQ11615925_File000002_223921330.doc

Add to Reading List

Source URL: ils.unc.edu

Language: English - Date: 2012-03-25 22:29:06
360Security / Confined space rescue / Rope rescue / Technical rescue / Confined space / Firefighter / Vehicle extrication / Rescue / Public safety / Emergency management

- 4 - - 4 - CONFINED SPACE RESCUE SKILLS LEVEL I

Add to Reading List

Source URL: www.cityoffargo.com

Language: English - Date: 2012-03-07 18:10:40
UPDATE