IT Downloads Results for Topic : Security

All
All
 
 
Showing 1-10 of 184 Results    
 
 
Security95

Guide to Cyber Threat Information Sharing

  ITDownload  
  |     |   Oct 21, 2016
 

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

...  More >>

 
email9

Trustworthy Email

  ITDownload  
  |   RESEARCH   |   Sep 22, 2016
 

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

...  More >>

 
Security73

Guide to Application Whitelisting

  ITDownload  
  |   TUTORIALS   |   Nov 09, 2015
 

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

...  More >>

 
Security29

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

  ITDownload  
  |   TUTORIALS   |   Nov 04, 2015
 

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

...  More >>

 
HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS   |   Oct 12, 2015
 

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

...  More >>

 
Security35.jpg

Secrets: Managing Information Assets in the Age of Cyberespionage

  ITDownload  
  |   BOOK EXCERPTS   |   Sep 30, 2015
 

In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business.

...  More >>

 
Security28

Web Security: A WhiteHat Perspective

  ITDownload  
  |   BOOK EXCERPTS   |   Jul 09, 2015
 

This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security.

...  More >>

 
Security58

Job Description: Senior Software Security Engineer

  ITDownload  
  |   JOB DESCRIPTIONS   |   Jul 02, 2015
 

The Senior Software Security Engineer is responsible for building a world-class program that embeds security into every aspect of the dev process.

...  More >>

 
Survey03

Interfaces for Personal Identity Verification

  ITDownload  
  |   TUTORIALS   |   Jun 04, 2015
 

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials.

...  More >>

 
Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES   |   Apr 02, 2015
 

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

...  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.