Security Management

Results: 59084



#Item
511Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-03-09 11:24:03
512Urban planning / Prevention / Safety / Security / Vulnerability assessment / Climate change adaptation / Critical infrastructure protection / Urban resilience / United Nations University / Emergency management / Structure / German Aerospace Center

Microsoft Word - 20151015FINAL_DFG_Roundtable_Participants_enJB

Add to Reading List

Source URL: www.uni-stuttgart.de

Language: English - Date: 2015-10-15 10:07:49
513Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / National Cybersecurity Center of Excellence / Cyber-security regulation

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
514Computer access control / Security / Prevention / Obfuscation / Password / Identity management / Cryptography / Password manager

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
515Software / Computing / System software / Proxy servers / Internet privacy / Reverse proxy / Computer networking / Network performance / Microsoft Forefront Threat Management Gateway / Squid / Internet Information Services / Windows NT 4.0

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41
516Health care / Medicine / Health / Pharmacy / Hospice / Pharmaceuticals policy / Compounding / Clinical pharmacology / Medical prescription / Pharmacist / Pain management / Drug Quality and Security Act

Focus on Medical Management Monitoring Compounds in Workers’ Compensation © 2015 CorVel Corporation. All rights reserved.

Add to Reading List

Source URL: www.corvel.com

Language: English - Date: 2015-06-16 14:20:35
517Privacy / Internet privacy / Identity management / Computing / Personally identifiable information / Computer security / Government / HTTP cookie / Medical privacy / In re Gateway Learning Corp. / FTC regulation of behavioral advertising

Realeflow Privacy Policy – May 20, 2014 Realeflow, LLC (“Realeflow”) has created this Privacy Policy to demonstrate our commitment to privacy and security. This Privacy Policy describes our policies and procedures

Add to Reading List

Source URL: realeflow.com

Language: English - Date: 2015-10-06 16:57:07
518Fisheries law / Fishing / Fisheries science / Natural environment / Fishing industry / Natural resources / Personally identifiable information / Privacy / Endangered Species Act / Privacy Office of the U.S. Department of Homeland Security / MagnusonStevens Fishery Conservation and Management Act / National Marine Fisheries Service

Version Number: U.S. Department of Commerce NOAA NMFS Privacy Impact Assessment

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2016-07-26 15:07:51
519Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
520Computer access control / Access control / Computer security / Password / Security / Login / Identity management / Self-service password reset / Password fatigue

Investor 360°®: Lo g g in g In to Yo u r Ac c o u nt First-time user Prior to logging in to Investor360°,® obtain your login ID and “one-time” password from your advisor. Please note: Should you have any difficu

Add to Reading List

Source URL: easysite.commonwealth.com

Language: English - Date: 2014-12-22 13:34:57
UPDATE