Security policy

Results: 30919



#Item
61

fTLD Registry Services’ Security Requirements April 2016 Requirement Registry Operator must define and implement a name selection policy (i.e., what types

Add to Reading List

Source URL: www.ftld.com

Language: English - Date: 2016-08-02 14:07:02
    62

    SCIENCE & TECHNOLOGY POLICY IN STITUTE A Study of Facilities and Infrastructure Planning, Prioritization, and Assessment at Federal Security Laboratories (Revised)

    Add to Reading List

    Source URL: www.ida.org

    Language: English - Date: 2015-09-18 09:42:58
      63

      TEXAS A&M UNIVERSITY GALVESTON 2017 Annual Security Report In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (20 USC § 1092(f), 34 CFR)

      Add to Reading List

      Source URL: urc.tamu.edu

      Language: English - Date: 2017-09-22 16:11:01
        64

        NDCP POLICY BRIEF A PUBLICATION SERIES ON NATIONAL SECURITY ISSUES BY THE NATIONAL DEFENSE COLLEGE OF THE PHILIPPINES 9 May 2013

        Add to Reading List

        Source URL: www.ndcp.edu.ph

        Language: English - Date: 2013-06-07 05:07:43
          65

          JIIA Policy Report Resolving the North Korean Nuclear Problem: A Regional Approach and the Role of Japan Project for Northeast Asian Security

          Add to Reading List

          Source URL: www2.jiia.or.jp

          Language: English - Date: 2008-01-29 01:36:05
            66

            Social Security Number Policy Guidelines Information Technology Services All departments were instructed to be in compliance with the University of Nebraska at Kearney Social Security Number Policy by January 1, 2008. Th

            Add to Reading List

            Source URL: www.unk.edu

            Language: English - Date: 2018-08-15 09:02:09
              67Network architecture / Computing / Internet Protocol / Internet architecture / IPv6 / IP addresses / Internet Standards / IPv4 / Router / Transmission Control Protocol / Border Gateway Protocol / IPv6 transition mechanism

              Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy Jakub Czyz∗ , Matthew Luckie† , Mark Allman‡ , and Michael Bailey§ ∗ University of Michigan and QuadMetrics, Inc.; jczyz@

              Add to Reading List

              Source URL: mdbailey.ece.illinois.edu

              Language: English - Date: 2016-03-02 08:24:56
              68

              Ohio Administrative Policy IT-15 IT Security Education and Awareness

              Add to Reading List

              Source URL: das.ohio.gov

              Language: English - Date: 2018-04-10 10:39:53
                69

                PRIVACY POLICY 1. Introduction British Naturalists’ Association (‘BNA’) is committed to protecting your privacy and security. This policy explains how and why we use your personal data, to ensure you remain informe

                Add to Reading List

                Source URL: www.bna-naturalists.org

                Language: English - Date: 2018-03-01 07:07:30
                  70

                  NATIONAL SECURITY POLICY Securing the Gains of Democracy

                  Add to Reading List

                  Source URL: www.nsc.gov.ph

                  Language: English - Date: 2013-03-21 01:44:22
                    UPDATE