Search for
Home > Computers > Security >

Policy
New! Submit a site
 
whatUseek Directory Site Listings:
 
How to Develop Your Companys First Security Baseline Standard - The goal of this document is to provide a guide for those charged with designing and implementing baseline security standards for the first time.
 
How to Develop a Network Secuity Policy White Paper - This document is for business executives, and others, who want to know more about Internet and internetworking security, and what measures you can take to protect your site.
 
ISO 17799 Service & Software Directory - Services and software for ISO 17799 audit, compliance, implementation and security risk analysis.
 
ISO 17799 Standard: ISO17799 Compliance & Positioning - The ISO 17799 security standard: How to achieve full ISO17799 compliance
 
IT Security Cookbook - Excellent online book including: Computer/Network security, Internet, Risk analysis, UNIX, NT, Oracle, Sybase, Applications etc.
 
ITworld.com - Security's human side - When it comes to keeping your company's systems secure, employees and managers play roles as important as those of the technological gadgets they deploy.
 
Information Flow: Lessons Learned from the Old School - Understanding how information flows is core to being able to protect that information in transport.
 
Information Security - Discussion of topic with security policies and baseline standards information.
 
Information Security Awarewness Policy - This document will explain the implementation of a security awareness policy and in what ways it is used to involve the user to be more alert towards security issues.
 
Information Security Policies & Computer Security Policy Directory - This directory is intended to help you ensure that your policies actually meet your needs.
 
Information Security Policy Handbook - This is an information page which must be filled out to download the Information Security Policy Handbook from Axent Inc.
 
Information Security Program Development - Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved.
 
Internet Security Policy: A Technical Guide - Contents - This document is intended to help an organization create a coherent Internet-specific information security policy.
 
Internet/Network Security Policy Development - How to write an effective network security policy. This is Part 4 of a 5 part tutorial on Internet and network security.
 
Model Security Policies - Sample of 25 model security policies for use as templates or guides when developing policies for your own environment.
 
Network & IT Security Policies - Where to find IT security policies, network security policies and a unique method to deliver them. Site includes trial downloads for all software offered.
 
Network Security Policy A Managers Perspective - The tool that a Network Manager has to facilitate and manage good Network Security is policy.
 
Number One Security Tool? Policy! - A collection of tips from some of the most successful security policies.
 
Outsourcing Security Management - This purpose of this paper is to highlight some high-level security issues, faced by organizations when outsourcing security management. Some key factors regarding preparation and management of the outsourcing partnership are also included.
 
PKI Policy Whitepaper - This PKI Note provides general information about PKI policy, the role that policy plays in a PKI and how that policy applies to both traditional and PKI-enabled business environments.
 
 

[ 1 2 3 4 5 ]
Help build the largest human-edited directory on the web.
  Submit a Site - Open Directory Project - Become an Editor  
About   Help   Content Filter   Terms   Privacy Policy

© 2018 whatUseek