Logical security

Results: 112



#Item
81Malware / Antivirus software / Software / Computer virus

Cabinet for Health and Family Services (CHFS) Information Technology (IT) Policies Category: [removed]Logical Security

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-10-08 18:42:01
82National security / Identity management / FIPS 201 / Standards / Crime prevention / Credential / E-Authentication / Access control / Logical access control / Security / Computer security / Public safety

Memorandum for Chief Information Officers

Add to Reading List

Source URL: georgewbush-whitehouse.archives.gov

Language: English - Date: 2008-05-27 17:43:08
83Computer network security / Computer security / Electronic commerce / Secure communication / Data security / Public safety / Security / Crime prevention / National security

Cabinet for Health and Family Services (CHFS) Information Technology (IT) Policies Category: [removed]Logical Security

Add to Reading List

Source URL: www.chfs.ky.gov

Language: English - Date: 2014-10-06 00:45:11
84Internet privacy / Network architecture / Server appliance / Crypto-anarchism / Virtual private network / Router / Virtual LAN / Avaya VPN Router / Virtual Private LAN Service / Computing / Computer network security / Computer architecture

Business Continuity / VPN Co-Location Private Network Interconnection Logical Diagram ® © 2009 Skycasters, LLC

Add to Reading List

Source URL: www.skycasters.com

Language: English - Date: 2012-03-14 13:04:04
85Shelf life / Prevention / Security / Health / Dangerous goods / Safety / Hazardous waste

PROCESS - Process Execution (OV-07 Logical Data Model Subject Area)

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
86Shelf life / Safety / Prevention / Security / Hazardous waste / Waste / Dangerous goods

PROCESS - Process Definition (OV-07 Logical Data Model Subject Area)

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
87Security / Shelf life / Authorization / Prevention / Dangerous goods / Safety / Hazardous waste

PROCESS - Process Authorization (OV-07 Logical Data Model Subject Area)

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
88Crime prevention / National security / Identity management / Information security / Authentication / Authorization / Password / Logical access control / Health Insurance Portability and Accountability Act / Security / Computer security / Access control

User Authorization, Identification and Authentication Policy

Add to Reading List

Source URL: info.dhhs.state.nc.us

Language: English - Date: 2014-03-24 11:26:13
89Computer network security / Modems / Logical Link Control / Integrated Services Digital Network / Network access / Virtual private network / IP address / Point-to-point protocol / Internet / Computing / Network architecture / Electronic engineering

Network Connection Specifications Version : 1.08 Date : April 17, 2003 Table of Contents

Add to Reading List

Source URL: boxexchange.com

Language: English - Date: 2013-01-16 21:18:25
90Access control / Password / Access token / Authentication / Login / Security token / Logical security / Security / Cryptography / Two-factor authentication

The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

Add to Reading List

Source URL: www.omh.ny.gov

Language: English - Date: 2011-10-13 14:14:16
UPDATE