<--- Back to Details
First PageDocument Content
Information technology audit / Auditing / Evaluation methods / Competency-based learning / Information Technology Security Assessment / Management / Human resource management / Business
Date: 2007-09-04 15:47:15
Information technology audit
Auditing
Evaluation methods
Competency-based learning
Information Technology Security Assessment
Management
Human resource management
Business

Add to Reading List

Source URL: www.collectionscanada.gc.ca

Download Document from Source Website

File Size: 60,23 KB

Share Document on Facebook

Similar Documents

This is to acknowledge that atsec information security corporation is an O-TTPS Recognized Assessor company eligible to provide assessment services in the Open Trusted Technology Providerâ„¢ Standard (O-TTPS) Accreditat

DocID: 1rkXi - View Document

Computing / Qualys / Computer security / Payment Card Industry Data Security Standard / Information technology / SAQ / Cloud computing security / Regulatory compliance / Questionnaire / Business process management / Cloud computing

SAQ SECURITY ASSESSMENT QUESTIONNAIRE Assess Business Risk with Automated Campaigns

DocID: 1r15W - View Document

Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

DocID: 1qRE7 - View Document

Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

DocID: 1qnt0 - View Document

Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

DocID: 1puNg - View Document