Exploit the possiblities
Showing 1 - 9 of 9 RSS Feed

Files

ais_plcy.wp6
Posted Aug 17, 1999

U.S. Customs AIS Security Policy Manual CIS HB 1400-05 (WordPerfect 6.1), June 1996

tags | paper
MD5 | c4197b316b0ad5e32e6a4038e8cfcb98
ais-doc.htm
Posted Aug 17, 1999

U.S. Customs Security Policy: Automated Information Systems Security Policy, Febraury 1996

tags | paper
MD5 | 7b2fdc617929433e5585f633c0dbb1b7
doc-copy.txt
Posted Aug 17, 1999

Department of Commerce's Software Copyright Policy, November 1993

tags | paper
MD5 | c64d4de1a5bdd6b187f67c69a3de064c
a130.txt
Posted Aug 17, 1999

Federal Requirements - OMB Circular A-130, Revised, February 1996

tags | paper
MD5 | 52cfcf352d737638b3ec457ea2c99e15
a130app3.txt
Posted Aug 17, 1999

Federal Requirements - Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources, February 1996

tags | paper
MD5 | ff7cd3b0abe284e8d6006319647244e4
csa_87.txt
Posted Aug 17, 1999

Federal Requirements - Computer Security Act of 1987, February 1992

tags | paper
MD5 | b12ad3842b04169af232e0b1de1197e6
doc-man.txt
Posted Aug 17, 1999

Department of Commerce beginning sections of the DOC "Information Technology Security Manual", November 1993

tags | paper
MD5 | 0ac3a790f8f8ca2fb36a5940963fd19f
doc-poli.txt
Posted Aug 17, 1999

epartment of Commerce's Chapter 10 of the DOC IT Management Handbook, which contains the IT Security policies for the Dept., November 1993

tags | paper
MD5 | c09cc76169a79e588de3d78f0631a668
opm_plcy.txt
Posted Aug 17, 1999

Federal Requirements - Computer Security Training Policy, February 1992

tags | paper
MD5 | d527d38925ca6ccc5a8909a72199256c
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
Ex-Santander Bank Manager Pleads Guilty To Computer Misuse Crimes
Posted Jan 18, 2018

tags | headline, privacy, bank, data loss, fraud
BIND Comes Apart Thanks To Ancient Denial Of Service Vuln
Posted Jan 17, 2018

tags | headline, dns, denial of service, flaw
Another Round Of Click-Fraud Extensions Pulled From Chrome Store
Posted Jan 17, 2018

tags | headline, malware, phone, google
Satori Botnet Successor Targets Ethereum Mining Rigs
Posted Jan 17, 2018

tags | headline, malware, bank, botnet, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close