IT Downloads Results for Topic : SecurityShowing 1-10 of 15 Results
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business.
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security.
The Senior Software Security Engineer is responsible for building a world-class program that embeds security into every aspect of the dev process.
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials.
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.