[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 209 Download | Alert*

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows 8.1 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows 8.1 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Ubutnu 18.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Ubutnu 18.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This benchmark has been created to assist IT professionals, in particular Windows XP system administrators and information security personnel, in effectively securing Windows XP Professional SP2 systems.

This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 6 formatted in the eXtensible Configuration Checklist Description Format (XCCDF). Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of network roles. Policy makers and baseline creators can use this catalog of settin ...

This guide has been created to assist IT professionals in effectively securing systems running Microsoft 7

The security series of papers will provide guidance from the Centers for Medicare and Medicaid Services (CMS) on the rule titled "Security Standards for the Protection of Electronic Protected Health Information," found at 45 CFR Part 160 and Part 164, Subparts A and C, commonly known as the Security Rule. The Security Rule was adopted to implement provisions of the Health Insuran ...

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   20

© SecPod Technologies