Security policy

Results: 30919



#Item
731National security / Secrecy / Crime prevention / Cryptography / Information governance / Non-disclosure agreement / Information security / Confidential / Health Insurance Portability and Accountability Act / Computer security / Protected health information

Employee Confidentiality Agreement For purposes of this document, "confidential information" is defined below and includes highly sensitive data as defined in the UW-Green Bay Information Security Policy. http://www.uwg

Add to Reading List

Source URL: www.uwgb.edu

Language: English - Date: 2012-02-28 16:29:06
732Cross-platform software / Markup languages / Scripting languages / HTML / Object-oriented programming languages / Cross-site scripting / HTTP cookie / JavaScript / Form / PHP / Same-origin policy / Java

Abstracting Application-Level Web Security David Scott Richard Sharp Laboratory For Communications Engineering

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:03
733Systemic risk / Stock market / 73rd United States Congress / Bank regulation / Deposit insurance / Security / Federal Deposit Insurance Corporation / Securities Exchange Act / Custodian bank / Federal Reserve System / DoddFrank Wall Street Reform and Consumer Protection Act / Securities market

Microsoft Word - investment-policy-2016.doc

Add to Reading List

Source URL: www.townofbrighton.net

Language: English - Date: 2016-05-25 18:55:47
734Identity management / Privacy / Law / Internet privacy / Money laundering / Information security / BNP Paribas / Information privacy

Privacy Policy in Respect of Handling of Personal Information

Add to Reading List

Source URL: cdn-pays.bnpparibas.com

Language: English - Date: 2016-03-07 03:01:02
735Internet protocols / Cryptographic protocols / Internet Standards / Computer network security / Tunneling protocols / IPsec / Virtual private network / Cisco Systems / Simple Network Management Protocol / Transport Layer Security / Cisco routers / Password

Cisco IOS 15.5M Router Security Policy Cisco Integrated Services Router (ISRISR, 1921 ISR, 1941 ISR, 2901 ISR, 2911 ISR, 2921 ISR, 2951 ISR, 3925 ISR, 3925E ISR, 3945 ISR, 3945E ISR, 5915 ESR and 5940 ESR Firmware

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 15:23:46
736Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / Revocation list / X.509 / Professional certification / Certification Practice Statement / Extended Validation Certificate

Microsoft Word - DutchGridCA-CPCPS-3.0.doc

Add to Reading List

Source URL: certificate.nikhef.nl

Language: English - Date: 2007-05-14 03:53:56
737Energy economics / Energy development / Energy policy / Natural gas / Gazprom / Politics of the European Union / South Stream / Nord Stream / Energy industry / Fossil fuel / Energy security / Russia in the European energy sector

PDF Document

Add to Reading List

Source URL: www.gazpromexport.com

Language: English - Date: 2012-12-04 10:28:16
738Computer network security / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Computer security / Computing / Software / Defensive computing / Sumter County Library /  FL

Internet Access Policy Adopted by the Library Board Of Trustees Effective: March 17, 2015

Add to Reading List

Source URL: www.myepl.org

Language: English - Date: 2015-03-20 14:17:59
739Identity management / Computer access control / Federated identity / Internet Standards / Shibboleth / Security Assertion Markup Language / Privacy policy / Authentication / Internet privacy / Privacy

Building and (inter)operating AA services. A tour into reality TERENA Mini Symposium on AA Prague, 24 October 2002

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:52
740Information technology / Open government / E-democracy / E-commerce / Government / E-government / E-governance / Information and communications technology / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

Microsoft Word - Chap6Iglesias_Egovernment Assessment on Philippine Cities-revised by Jen

Add to Reading List

Source URL: pascn.pids.gov.ph

Language: English - Date: 2014-08-11 04:07:44
UPDATE