Information Technology Security Assessment

Results: 459



#Item
11GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

GAOLibrary of Congress: Strong Leadership Needed to Address Serious Information Technology Management Weaknesses

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2015-04-01 14:00:53
12© JORDAN YOUNGS  Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)

© JORDAN YOUNGS Report of the Information and Communication Technology (ICT) Division – Information Technology Security Audit Fiscal Year (2014 – 2015)

Add to Reading List

Source URL: www.eco.gov.yk.ca

Language: English - Date: 2016-01-26 14:30:26
13   UTC Project Information Project Title  Transit and Rail Security: A Critical Assessment of What Works

  UTC Project Information Project Title Transit and Rail Security: A Critical Assessment of What Works

Add to Reading List

Source URL: transweb.sjsu.edu

Language: English - Date: 2016-02-01 14:34:30
14Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-05-19 17:57:00
15Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
16Complete Assessment Lifecycle

Complete Assessment Lifecycle

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
17HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference  Safeguard (Standard)

HIPAA Security Rules Addressed in Guided Assessment Administrative Safeguards HIPAA Security Rule Reference Safeguard (Standard)

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
18Business / Accountability / Executive agencies of the Scottish Government / Security / Records management / Scottish Natural Heritage / Information security / Electronic document and records management system / National Archives of Scotland / Content management systems / Administration / Information technology management

Assessment Report

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2014-08-28 06:41:07
19Microsoft Word - Information Security Risk Management for Healthcare Systems.doc

Microsoft Word - Information Security Risk Management for Healthcare Systems.doc

Add to Reading List

Source URL: www.medicalimaging.org

Language: English - Date: 2014-06-12 12:27:58
20Mass Surveillance  Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Mass Surveillance Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:03