Security Technical Implementation Guide

Results: 43



#Item
1Data management / Software / Computing / System administration / Cross-platform software / Relational database management systems / PostgreSQL / SQL / Column / Superuser / Sudo / Database

UNCLASSIFIED   PostgreSQL 9.x Security Technical Implementation Guide Version: 1

Add to Reading List

Source URL: www.crunchydata.com

Language: English - Date: 2018-10-22 15:02:19
2Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2015-12-16 04:48:58
3Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
4Cross-platform software / Optimizely / Functional languages / Scripting languages / Concurrent programming languages / Object-oriented programming languages / JavaScript / Security token / Experiment / Java

Optimizely Headline Testing Technical Implementation Guide 631 HOWARD ST. #100 SAN FRANCISCO, CA 94105

Add to Reading List

Source URL: blog.optimizely.com

Language: English - Date: 2015-05-20 18:31:10
5Classes of computers / Laptop / Commercial off-the-shelf / Computer security / Operating system / Personal computer / Security Technical Implementation Guide

CASE STUDY Information Technology Services Providing Security Hardened COTS Laptops to the US DoD Overview

Add to Reading List

Source URL: www.tanagerinc.com

Language: English - Date: 2016-06-27 12:53:33
6Security Technical Implementation Guide / Defense Information Systems Agency / Videotelephony / Videoconferencing / Information technology management / Technology / Computer security / Security / Configuration management

UNCLASSIFIED VIDEO SERVICES POLICY SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW

Add to Reading List

Source URL: www.freeporttech.com

Language: English - Date: 2015-03-31 15:07:35
7Technical communication / Software / Technology / Computer security / Quattor / Security Technical Implementation Guide / Information technology management / Method engineering / Configuration management

State of New Mexico Statewide Architectural Configuration Requirement Title: Configuration Management Standard S-STD002.001 Effective Date: October 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:14
8Evaluation / Security Technical Implementation Guide / Computing / Security / Computer security / United States Department of Defense / Common Criteria

Microsoft Word - DoD_Annex_for_PP_for_APP SW_V1R1_final.docx

Add to Reading List

Source URL: iase.disa.mil

Language: English - Date: 2014-11-05 10:28:10
9Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
10Open Vulnerability and Assessment Language / Vulnerability / Information assurance vulnerability alert / Critical infrastructure protection / Defense Information Systems Agency / Information assurance / Security Technical Implementation Guide / Information security / Federal Information Security Management Act / Computer security / Security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 14:03:27
UPDATE