Security management

Results: 59084



#Item
471Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-15 09:06:22
472Computing / Cloud computing / Cloud infrastructure / Cloud computing security / Computer security / Cloud storage / Distributed file system for cloud / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:40:52
473Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
474Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Kek / Professional certification

KEK GRID CA Service Certificate Policy and Certificate Practices Statements Ver

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2006-07-11 23:24:54
475Computer access control / Computer security / Access control / Identity management / Password / Security / Multi-factor authentication / Authentication / Password strength / Password manager

THE FACTS: PASSWORDS & SECURING YOUR ACCOUNTS Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords. How do I create a good password?

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
476Emergency management / Disaster preparedness / Safety / Prevention / Humanitarian aid / Business continuity and disaster recovery / National security / Resilience / Security / Psychological resilience / Sustainability / Urban resilience

Industry Statement on Resilience Representing nearly 1.7 million professionals, America’s design and construction industry is one of the largest sectors of this nation’s economy, generating over $1 trillion in GDP. W

Add to Reading List

Source URL: www.ies.org

Language: English - Date: 2016-05-09 10:02:56
477Cryptography / Internet / Computing / Internet protocols / Internet Standards / Domain name system / Key management / Public-key cryptography / Domain Name System Security Extensions / Digital signature / Zone file

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
478Economy / Finance / Money / Insurance / Risk management / ARC / Arc @ UNSW Limited / Food security / Ngozi Okonjo-Iweala

Report and Decisions of the Second Conference of the Parties of the African Risk Capacity (ARC) Agency ARC/COP2/D014.2811_13 Second ARC Conference of the Parties Nairobi, Kenya

Add to Reading List

Source URL: www.africanriskcapacity.org

Language: English
479Economy / Finance / Money / Financial markets / Stock market / Financial services / Investment / Security / Bond / U.S. Securities and Exchange Commission / Issuer / Foreign direct investment

ItemMatthews International Capital Management, LLC Four Embarcadero Center, Suite 550 San Francisco, CAMain Phone: (

Add to Reading List

Source URL: micm-llc.com

Language: English - Date: 2016-04-13 19:17:04
480Computer access control / Security / Computer security / CAPTCHA / Transaction authentication number / Authentication / Challengeresponse authentication / Multi-factor authentication / Internet bot / Turing test / Form

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:41:31
UPDATE