<--- Back to Details
First PageDocument Content
National Institute of Standards and Technology / Computing / Risk analysis / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Information security / Security controls / Federal Information Processing Standard / Asset / Computer security / Data security / Security
Date: 2010-12-01 21:05:57
National Institute of Standards and Technology
Computing
Risk analysis
Federal Information Security Management Act
Standards for Security Categorization of Federal Information and Information Systems
Information security
Security controls
Federal Information Processing Standard
Asset
Computer security
Data security
Security

6264 Federal Register / Vol. 69, No[removed]Tuesday, February 10, [removed]Notices These deposit requirements shall remain in effect until publication of the

Add to Reading List

Source URL: www.gpo.gov

Download Document from Source Website

File Size: 166,92 KB

Share Document on Facebook

Similar Documents

    Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

   Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

DocID: 1vidI - View Document

Microsoft Word - CABForum_Network_Security_Controls.doc

Microsoft Word - CABForum_Network_Security_Controls.doc

DocID: 1uUnT - View Document

Thomson Reuters Service Organization Controls 3 SysTrust Report System Description of the Thomson Reuters Legal Tracker System Based in the United States Relevant to Security, Availability, Processing

Thomson Reuters Service Organization Controls 3 SysTrust Report System Description of the Thomson Reuters Legal Tracker System Based in the United States Relevant to Security, Availability, Processing

DocID: 1uQLo - View Document

D ATA S H E E T  Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

D ATA S H E E T Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

DocID: 1utCb - View Document

Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

DocID: 1udM0 - View Document