User contributions
From LIMSWiki
Jump to navigationJump to search- 19:55, 7 November 2016 diff hist +781 Nm User talk:Etimmermann Welcome! current
- 16:07, 6 September 2016 diff hist +782 Nm User talk:MAQSIMA Welcome!
- 16:03, 6 September 2016 diff hist +782 Nm User talk:EffiChem Welcome! current
- 15:56, 6 September 2016 diff hist +782 Nm User talk:Corsellas1957 Welcome!
- 20:16, 18 July 2016 diff hist +778 Nm User talk:Alaraalkin Welcome! current
- 20:01, 18 July 2016 diff hist +778 Nm User talk:Atroxell Welcome! current
- 19:53, 18 July 2016 diff hist +778 Nm User talk:Nlambeng Welcome! current
- 19:51, 18 July 2016 diff hist +778 Nm User talk:IDBS Welcome! current
- 15:11, 27 June 2016 diff hist +778 Nm User talk:Haleyr Welcome! current
- 22:20, 21 June 2016 diff hist +414 N Defensive computing Transcluded, per John current
- 22:18, 21 June 2016 diff hist +408 N Penetration test Transcluded, per John current
- 22:15, 21 June 2016 diff hist +428 N Incident management Transcluded, per John current
- 22:12, 21 June 2016 diff hist +385 N Risk IT Transcluded, per John current
- 22:09, 21 June 2016 diff hist +407 N IT risk management Transcluded, per John
- 22:05, 21 June 2016 diff hist +393 N Cloud Security Alliance Transcluded, per John current
- 22:03, 21 June 2016 diff hist +385 N Data recovery Transcluded, per John
- 22:00, 21 June 2016 diff hist +415 N Business continuity planning Transcluded, per John current
- 21:57, 21 June 2016 diff hist +429 N IT Baseline Protection Catalogs Transcluded, per John current
- 21:55, 21 June 2016 diff hist +450 N Information technology security audit Transcluded, per John current
- 21:53, 21 June 2016 diff hist +386 N ISO/IEC 27000 Transcluded, per John current
- 21:52, 21 June 2016 diff hist +19 m Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices →Cloud Computing Security Handbook: Regulatory Compliance and Best Practices: Added item
- 21:49, 21 June 2016 diff hist +397 N Information security management Transcluded, per John current
- 21:47, 21 June 2016 diff hist +424 N Vulnerability management Transcluded, per John current
- 21:41, 21 June 2016 diff hist +400 N Secret sharing Transcluded, per John current
- 21:40, 21 June 2016 diff hist +404 N Key distribution Transcluded, per John current
- 21:38, 21 June 2016 diff hist +416 N Homomorphic encryption Transcluded, per John current
- 21:37, 21 June 2016 diff hist +424 N Digital transaction management Transcluded, per John current
- 21:34, 21 June 2016 diff hist +451 N Bring your own encryption Transcluded, per John current
- 21:30, 21 June 2016 diff hist +424 N Attribute-based encryption Transcluded, per John current
- 21:25, 21 June 2016 diff hist +415 N Security as a service Transcluded, per John
- 21:23, 21 June 2016 diff hist +412 N Cloud computing security Transcluded, per John current
- 21:21, 21 June 2016 diff hist +375 N Information security Transcluded, per John current
- 21:15, 21 June 2016 diff hist +381 N Network security Transcluded, per John current
- 21:13, 21 June 2016 diff hist +383 N Computer security Transcluded, per John current
- 21:11, 21 June 2016 diff hist +334 N Security Transcluded, per John
- 21:07, 21 June 2016 diff hist +448 N Payment Card Industry Data Security Standard Transcluded, per John current
- 21:04, 21 June 2016 diff hist +386 N ISO/IEC 38500 Transcluded, per John current
- 21:02, 21 June 2016 diff hist +462 N Corporate governance of information technology Transcluded, per John
- 21:00, 21 June 2016 diff hist 0 m Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices →Cloud Computing Security Handbook: Regulatory Compliance and Best Practices: Ordering
- 20:59, 21 June 2016 diff hist +414 N Corporate Governance of ICT Transcluded, per John
- 20:57, 21 June 2016 diff hist +370 N COBIT Transcluded, per John current
- 20:53, 21 June 2016 diff hist +374 N AS 8015 Transcluded, per John current
- 20:33, 21 June 2016 diff hist +440 N General Data Protection Regulation Transcluded, per John current
- 20:30, 21 June 2016 diff hist +422 N Data Protection Directive Transcluded, per John current
- 20:28, 21 June 2016 diff hist +385 N Sarbanes–Oxley Act Transcluded, per John current
- 20:27, 21 June 2016 diff hist −8 m Book:Cloud Computing Security Handbook: Regulatory Compliance and Best Practices →Cloud Computing Security Handbook: Regulatory Compliance and Best Practices: Fix
- 20:27, 21 June 2016 diff hist +36 m Gramm–Leach–Bliley Act Cat current
- 20:26, 21 June 2016 diff hist +36 m Federal Information Security Management Act of 2002 Cat current
- 20:17, 21 June 2016 diff hist +400 N Gramm–Leach–Bliley Act Transcluded, per John
- 20:14, 21 June 2016 diff hist +26 m FedRAMP →Notes: Added cat. current