IT Downloads Results for Topic : Security - Page 2

All
All
 
 
Showing 11-20 of 184 Results    
 
 
Security7

Risk Management for Replication Devices

  ITDownload  
  |   POLICIES   |   Feb 24, 2015
 

This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed, stored, or transmitted on replication devices.

...  More >>

 
Mobile45

Vetting the Security of Mobile Applications

  ITDownload  
  |   POLICIES   |   Jan 26, 2015
 

The purpose of this document is to help organizations understand the process for vetting the security of mobile applications, plan for the implementation of an app vetting process, develop app security requirements, and understand the types of app vulnerabilities and the testing methods used to detect those vulnerabilities.

...  More >>

 
DataM25

Guidelines for Media Sanitization

  ITDownload  
  |   POLICIES   |   Dec 29, 2014
 

This guide will assist organizations and system owners in making practical sanitization decisions based on the categorization of confidentiality of their information.

...  More >>

 
Security44

Assessing Security and Privacy Controls in Federal Information Systems and Organizations

  ITDownload  
  |   TUTORIALS   |   Dec 15, 2014
 

This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.

...  More >>

 
Security10

Job Description: Cybersecurity Program Manager

  ITDownload  
  |   JOB DESCRIPTIONS   |   Dec 08, 2014
 

The cybersecurity program manager will support the execution of product cybersecurity elements across global programs and services.

...  More >>

 
DataCtr1

BIOS Protection Guidelines for Servers

  ITDownload  
  |   TUTORIALS   |   Oct 21, 2014
 

The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS code.

...  More >>

 
Money3

PCI Compliance: The Definitive Guide

  ITDownload  
  |   BOOK EXCERPTS   |   Aug 21, 2014
 

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.

...  More >>

 

Approximate Matching: Definition and Terminology

  ITDownload  
  |   RESEARCH   |   Jul 10, 2014
 

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

...  More >>

 
mobile30

Guidelines on Mobile Device Forensics

  ITDownload  
  |   TUTORIALS   |   Jun 02, 2014
 

This guide provides an in-depth look into mobile devices and explains technologies involved and their relationship to forensic procedures.

...  More >>

 
Security3TN

Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations

  ITDownload  
  |   TUTORIALS   |   Apr 30, 2014
 

Transport Layer Security (TLS) provides mechanisms to protect sensitive data during electronic dissemination across networks.

...  More >>

 
 
 
Pages:   « Prev1 | 2 34Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.