251![Request for Proposal Enterprise Information Technology Security Assessment ADDENDUM #1 Vermont Energy Investment Corporation 128 Lakeside Ave Suite 401 Request for Proposal Enterprise Information Technology Security Assessment ADDENDUM #1 Vermont Energy Investment Corporation 128 Lakeside Ave Suite 401](https://www.pdfsearch.io/img/c5ad4d9fc0c4b74bf9cc2e78e5ec245c.jpg) | Add to Reading ListSource URL: www.veic.orgLanguage: English - Date: 2014-07-15 16:01:20
|
---|
252![Request for Proposal Enterprise Information Technology Security Assessment 1. Summary The Vermont Energy Investment Corporation (VEIC), a non-profit corporation, requests proposals for an Enterprise Information Technolog Request for Proposal Enterprise Information Technology Security Assessment 1. Summary The Vermont Energy Investment Corporation (VEIC), a non-profit corporation, requests proposals for an Enterprise Information Technolog](https://www.pdfsearch.io/img/ffcea8d9f028d5749618cef9de74a888.jpg) | Add to Reading ListSource URL: veic.orgLanguage: English - Date: 2014-07-07 08:42:15
|
---|
253![Cyberwarfare / Risk analysis / Cryptography standards / Information Risk Management / Security controls / National Institute of Standards and Technology / FIPS 140-2 / Standards for Security Categorization of Federal Information and Information Systems / Information security management system / Data security / Computer security / Security Cyberwarfare / Risk analysis / Cryptography standards / Information Risk Management / Security controls / National Institute of Standards and Technology / FIPS 140-2 / Standards for Security Categorization of Federal Information and Information Systems / Information security management system / Data security / Computer security / Security](/pdf-icon.png) | Add to Reading ListSource URL: www.cdc.govLanguage: English - Date: 2011-05-20 09:08:47
|
---|
254![Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our c Enterprise Information Technology Security Assessment RFP Answers to Questions GENERAL QUESTIONS Q: How do the goals of the security assessment relate to improving the way VEIC does business? A: Security of our and our c](https://www.pdfsearch.io/img/9854b810fedeb7f88fd074c9d7fc73f7.jpg) | Add to Reading ListSource URL: www.veic.orgLanguage: English - Date: 2014-07-25 16:23:39
|
---|
255![ITL Bulletin February 2002, Risk Management Guidance for Information Technology Systems ITL Bulletin February 2002, Risk Management Guidance for Information Technology Systems](https://www.pdfsearch.io/img/04188ce11de0b2b940ba8b1c80f3b275.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-03-22 09:24:28
|
---|
256![Request for Proposal Enterprise Information Technology Security Assessment 1. Summary The Vermont Energy Investment Corporation (VEIC), a non-profit corporation, requests proposals for an Enterprise Information Technolog Request for Proposal Enterprise Information Technology Security Assessment 1. Summary The Vermont Energy Investment Corporation (VEIC), a non-profit corporation, requests proposals for an Enterprise Information Technolog](https://www.pdfsearch.io/img/966248a0b8be43aa36d920f23391e10b.jpg) | Add to Reading ListSource URL: www.veic.orgLanguage: English - Date: 2014-07-07 08:42:15
|
---|
257![Request for Proposal Enterprise Information Technology Security Assessment ADDENDUM #1 Vermont Energy Investment Corporation 128 Lakeside Ave Suite 401 Request for Proposal Enterprise Information Technology Security Assessment ADDENDUM #1 Vermont Energy Investment Corporation 128 Lakeside Ave Suite 401](https://www.pdfsearch.io/img/5b9590504b80c53dec9851e2d31ec9dc.jpg) | Add to Reading ListSource URL: veic.orgLanguage: English - Date: 2014-07-15 16:01:20
|
---|
258![Federal Information Security Management Act / Security controls / Certification and Accreditation / Security risk / Information security / Penetration test / Information Technology Security Assessment / Information assurance / FIPS 140-2 / Computer security / Security / Computing Federal Information Security Management Act / Security controls / Certification and Accreditation / Security risk / Information security / Penetration test / Information Technology Security Assessment / Information assurance / FIPS 140-2 / Computer security / Security / Computing](/pdf-icon.png) | Add to Reading ListSource URL: www2.ed.govLanguage: English - Date: 2007-07-27 11:09:36
|
---|
259![Security Automation Developer Days July 9 -13, 2012 Discussion Session Briefing Session Demo Session Security Automation Developer Days July 9 -13, 2012 Discussion Session Briefing Session Demo Session](https://www.pdfsearch.io/img/b496873c4375270afe336877b8a7ea14.jpg) | Add to Reading ListSource URL: measurablesecurity.mitre.orgLanguage: English - Date: 2012-07-10 08:09:20
|
---|
260![FY 2004 Annual Report on Federal Agency Use of Voluntary Consensus Standards and Conformity Assessment FY 2004 Annual Report on Federal Agency Use of Voluntary Consensus Standards and Conformity Assessment](https://www.pdfsearch.io/img/295cf1d282c1ef0c40b08967cc4d742b.jpg) | Add to Reading ListSource URL: georgewbush-whitehouse.archives.govLanguage: English - Date: 2005-08-22 10:20:38
|
---|