Vulnerability database

Results: 242



#Item
171STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
172Questions and Answers  RFP[removed]: Amendment 1 Database Vulnerability Scanner June 6, 2014

Questions and Answers RFP[removed]: Amendment 1 Database Vulnerability Scanner June 6, 2014

Add to Reading List

Source URL: www.dshs.wa.gov

Language: English - Date: 2014-06-06 14:41:18
173Business Brief  Secure Your Databases for Sustainable SOX Compliance  Key Advantages

Business Brief Secure Your Databases for Sustainable SOX Compliance Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:09
174AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2005-09-02 09:07:58
175STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.18 Information Resources – Security Monitoring Approved July 18, 2005 Revised April 27, 2010

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.18 Information Resources – Security Monitoring Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
176Business Brief  HIPAA/HITECH Compliance for Databases Comply fully and reduce database security risk  SC Magazine 2012 Best Database

Business Brief HIPAA/HITECH Compliance for Databases Comply fully and reduce database security risk SC Magazine 2012 Best Database

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:44
177Conceptual model: 3 application areas  Recording Disaster Losses Recommendations for a European approach

Conceptual model: 3 application areas Recording Disaster Losses Recommendations for a European approach

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2013-09-13 21:16:18
178The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-03 21:04:32
179The Relative Vulnerability of Migratory Bird Species to Offshore Wind Energy Projects on the Atlantic Outer Continental Shelf: An Assessment Method and Database

The Relative Vulnerability of Migratory Bird Species to Offshore Wind Energy Projects on the Atlantic Outer Continental Shelf: An Assessment Method and Database

Add to Reading List

Source URL: www.data.boem.gov

Language: English - Date: 2013-11-08 12:47:57
1802013 State of Information Security in the Commonwealth of Virginia for the period July 1, 2012 thorugh June 30, 2013

2013 State of Information Security in the Commonwealth of Virginia for the period July 1, 2012 thorugh June 30, 2013

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2013-10-09 11:19:36