[Forgot Password]
Login  Register Subscribe

23631

 
 

127000

 
 

102010

 
 

909

 
 

81059

 
 

123

 
 
Paid content will be excluded from the download.

Filter
Matches : 121 Download | Alert*

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows Server 2016 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows Server 2012 R2 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows Server 2008 R2 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows 8.1 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows 7 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Microsoft Windows 10 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Apple Mac OS X 10.10 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Apple Mac OS X 10.9 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

Sample SCAP content from SCAP Repo for product vendors to perform tests and SCAP validation

The security series of papers will provide guidance from the Centers for Medicare and Medicaid Services (CMS) on the rule titled "Security Standards for the Protection of Electronic Protected Health Information," found at 45 CFR Part 160 and Part 164, Subparts A and C, commonly known as the Security Rule. The Security Rule was adopted to implement provisions of the Health ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    ..   12

© 2013 SecPod Technologies