[Forgot Password]
Login  Register Subscribe

30192

 
 

423868

 
 

233697

 
 

909

 
 

186637

 
 

207

 
 
Paid content will be excluded from the download.

Filter
Matches : 197 Download | Alert*

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...

The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. PCI DSS applies to all entities involved in payment card processing including merchants ...

The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. PCI DSS applies to all entities involved in payment card processing including merchants ...

The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data. PCI DSS applies to all entities involved in payment card processing - including merchan ...

Microsoft Windows 8 Computer Security Policies Settings : This reference focuses on those settings that are considered security settings. This reference examines only the settings and features in the Windows operating systems that can help organizations secure their enterprises against malicious software threats. Management features and those security features that are not configurable by adminis ...

This guide presents a catalog of security-relevant configuration settings for Ubutnu 14.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Ubutnu 18.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Ubutnu 18.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Mac OS X 10.12 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Apple Mac OS X 10.12 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).


Pages:      Start    5    6    7    8    9    10    11    12    13    14    15    16    17    18    ..   19

© SecPod Technologies