Information Technology Security Assessment

Results: 459



#Item
361Moving Baselines Forward Kent Landfield Director, Content Strategy, Architecture and Standards Overview • The Vision of Baselines and Benchmark Developments

Moving Baselines Forward Kent Landfield Director, Content Strategy, Architecture and Standards Overview • The Vision of Baselines and Benchmark Developments

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:51
362SIAM Security Impact Assessment Measures Impact Analysis Report  Deliverable 3.7

SIAM Security Impact Assessment Measures Impact Analysis Report Deliverable 3.7

Add to Reading List

Source URL: www.tu-berlin.de

Language: English - Date: 2014-03-13 15:50:27
363Microsoft PowerPoint - WilliamsKatherine_PosterFinal DM.pptx [Read-Only]

Microsoft PowerPoint - WilliamsKatherine_PosterFinal DM.pptx [Read-Only]

Add to Reading List

Source URL: computing.ornl.gov

Language: English - Date: 2012-08-08 12:50:38
364SIAM Security Impact Assessment Measures 1st Periodic Report

SIAM Security Impact Assessment Measures 1st Periodic Report

Add to Reading List

Source URL: www.tu-berlin.de

Language: English - Date: 2014-03-13 15:52:12
365Enterprise architecture / Strategic management / Video game development / Federal enterprise architecture / Computer security / Segment architecture / Electronic Arts / IT risk management / Enterprise Architecture Assessment Framework / Information technology management / Management / United States Office of Management and Budget

Department of Education Enterprise Transition Strategy Plan, February 2008 Department of Education Enterprise Transition Strategy Plan, February 2008

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2014-03-13 14:33:50
366Cyberwarfare / Computer network security / Data security / Penetration test / Information security / Vulnerability / Application security / SecurityMetrics / Computer security / Software testing / Security

Vulnerability Assessment / Penetration Test Request and Authorization Form To properly secure State of Utah, information technology assets, the Enterprise Information Security Office (EISO) is required to assess informa

Add to Reading List

Source URL: dts.utah.gov

Language: English - Date: 2013-07-10 13:20:52
367Microsoft Word[removed]Internal Control Overview.doc

Microsoft Word[removed]Internal Control Overview.doc

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2012-02-24 13:11:45
368Date Received  Eastern Ontario Development Program Application- Part A- Project Information APPLICATION INFORMATION Legal Name of Applicant:

Date Received Eastern Ontario Development Program Application- Part A- Project Information APPLICATION INFORMATION Legal Name of Applicant:

Add to Reading List

Source URL: www.grenvillecfdc.com

Language: English - Date: 2014-07-16 14:09:34
369Consolidated Financial Systems Privacy Impact Assessment

Consolidated Financial Systems Privacy Impact Assessment

Add to Reading List

Source URL: www.pbgc.gov

Language: English - Date: 2013-11-19 10:18:03
370Quality Data Self-Assessment Survey (School) District: ________________________________________________________________ School Self-Assessment Rate your response to each of the prompts based on the following scale: No ev

Quality Data Self-Assessment Survey (School) District: ________________________________________________________________ School Self-Assessment Rate your response to each of the prompts based on the following scale: No ev

Add to Reading List

Source URL: nces.ed.gov

Language: English - Date: 2013-07-10 09:56:26