[Forgot Password]
Login  Register Subscribe

23631

 
 

126995

 
 

100182

 
 

909

 
 

80298

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 109 Download | Alert*

This International Standard has been prepared to provide requirements for establishing, implementing, maintaining and continually improving an information security management system. The adoption of an information security management system is a strategic decision for an organization. The establishment and implementation of an organization's information security management system is influenced by ...

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...

The purpose of this publication is to provide guidelines for selecting and specifying security controls for information systems supporting the executive agencies of the federal government to meet the requirements of FIPS 200, Minimum Security Requirements for Federal Information and Information Systems. The guidelines apply to all components11 of an information system that process, store, or trans ...

This guide has been created to assist IT professionals, in effectively securing systems with Microsoft Windows 7 Firewall

This guide presents a catalog of security-relevant configuration settings for Ubuntu 14.10 formatted in the eXtensible Configuration Checklist Description Format (XCCDF). <br xmlns="http://www.w3.org/1999/xhtml" /> <br xmlns="http://www.w3.org/1999/xhtml" /> Providing system administrators with such guidance informs them how to securely configure systems under their control in a variety of n ...

This guide has been created to assist IT professionals in effectively securing systems running Red Hat Enterprise Linux 5 desktops.

This guide presents a catalog of security-relevant configuration settings for Red Hat Enterprise Linux 7 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for CentOS 7 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

This guide presents a catalog of security-relevant configuration settings for Ubutnu 14.04 formatted in the eXtensible Configuration Checklist Description Format (XCCDF).

SecPod Saner 2.0 Generic Compliance Standards


Pages:      Start    1    2    3    4    5    6    7    8    9    10    ..   10

© 2013 SecPod Technologies