Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files

ais_plcy.wp6
Posted Aug 17, 1999

U.S. Customs AIS Security Policy Manual CIS HB 1400-05 (WordPerfect 6.1), June 1996

tags | paper
MD5 | c4197b316b0ad5e32e6a4038e8cfcb98
ais-doc.htm
Posted Aug 17, 1999

U.S. Customs Security Policy: Automated Information Systems Security Policy, Febraury 1996

tags | paper
MD5 | 7b2fdc617929433e5585f633c0dbb1b7
doc-copy.txt
Posted Aug 17, 1999

Department of Commerce's Software Copyright Policy, November 1993

tags | paper
MD5 | c64d4de1a5bdd6b187f67c69a3de064c
a130.txt
Posted Aug 17, 1999

Federal Requirements - OMB Circular A-130, Revised, February 1996

tags | paper
MD5 | 52cfcf352d737638b3ec457ea2c99e15
a130app3.txt
Posted Aug 17, 1999

Federal Requirements - Appendix III to OMB Circular No. A-130 - Security of Federal Automated Information Resources, February 1996

tags | paper
MD5 | ff7cd3b0abe284e8d6006319647244e4
csa_87.txt
Posted Aug 17, 1999

Federal Requirements - Computer Security Act of 1987, February 1992

tags | paper
MD5 | b12ad3842b04169af232e0b1de1197e6
doc-man.txt
Posted Aug 17, 1999

Department of Commerce beginning sections of the DOC "Information Technology Security Manual", November 1993

tags | paper
MD5 | 0ac3a790f8f8ca2fb36a5940963fd19f
doc-poli.txt
Posted Aug 17, 1999

epartment of Commerce's Chapter 10 of the DOC IT Management Handbook, which contains the IT Security policies for the Dept., November 1993

tags | paper
MD5 | c09cc76169a79e588de3d78f0631a668
opm_plcy.txt
Posted Aug 17, 1999

Federal Requirements - Computer Security Training Policy, February 1992

tags | paper
MD5 | d527d38925ca6ccc5a8909a72199256c
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Expands Bug Bounty To Include Fraud Protection Bypass
Posted Aug 16, 2018

tags | headline, fraud, flaw, google
Credit Card Skimmers Now Need To Fear The Reaper
Posted Aug 16, 2018

tags | headline, hacker, bank, cybercrime, fraud, conference
The Hackers Hunting Down Missing People
Posted Aug 16, 2018

tags | headline, hacker, privacy, conference
President Trump Relaxes US Cyber-Attack Rules
Posted Aug 16, 2018

tags | headline, government, usa, cyberwar, fbi, nsa, cia
Mystery Russian Satellite's Behavior Raises Alarm In US
Posted Aug 15, 2018

tags | headline, usa, russia, space, cyberwar, spyware
Adobe Fixes Critical Code Execution Flaws In Latest Patch Update
Posted Aug 15, 2018

tags | headline, flaw, adobe, patch
Instagram Hack Is Locking Hundreds Of Users Out Of Their Accounts
Posted Aug 15, 2018

tags | headline, hacker, denial of service, password, facebook
Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses
Posted Aug 15, 2018

tags | headline, flaw, cryptography, intel
Hackers Can Edit Policy Body Cam Footage Without Anybody Noticing
Posted Aug 15, 2018

tags | headline, hacker, government
Google Tracks Users Who Turn Off Location History
Posted Aug 15, 2018

tags | headline, privacy, google, spyware
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close