When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Title 37 of the United States Code - Wikipedia

    en.wikipedia.org/wiki/Title_37_of_the_United...

    Title 37 of the United States Code outlines the role of Pay and Allowances of the Uniformed Services in the United States Code. Contents. 37 U.S.C. ch. 1—Definitions;

  3. Federal Information Security Management Act of 2002

    en.wikipedia.org/wiki/Federal_Information...

    The Federal Information Security Management Act of 2002 (FISMA, 44 U.S.C. § 3541, et seq.) is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002 (Pub. L. 107–347 (text), 116 Stat. 2899).

  4. ISO/IEC 27007 - Wikipedia

    en.wikipedia.org/wiki/ISO/IEC_27007

    The standard is about [3] how an information security management system audit can be performed based on a variety of audit criteria, separately or in combination, which include, among others: Requirements defined in ISO/IEC 27001. Policies and requirements specified by relevant interested parties. Statutory and regulatory requirements.

  5. U.S.C. Institute of Safety and Systems Management - Wikipedia

    en.wikipedia.org/wiki/U.S.C._Institute_of_Safety...

    For instance, former astronaut Major General Charles F. Bolden, Jr., USMC(Ret), appointed by President Barack Obama as N.A.S.A. Administrator July 2009, received the MSSM from USC in 1977. [4] The Institute of Systems and Safety Management was an example of an organization that was outstanding at what it did, that provided a unique and world ...

  6. Configuration management - Wikipedia

    en.wikipedia.org/wiki/Configuration_management

    ITIL specifies the use of a configuration management system (CMS) or configuration management database (CMDB) as a means of achieving industry best practices for Configuration Management. CMDBs are used to track Configuration Items (CIs) and the dependencies between them, where CIs represent the things in an enterprise that are worth tracking ...

  7. Risk Management Framework - Wikipedia

    en.wikipedia.org/wiki/Risk_management_framework

    The Risk Management Framework (RMF) is a United States federal government guideline, standard, and process for managing risk to help secure information systems (computers and networks). The RMF was developed by the National Institute of Standards and Technology (NIST), and provides a structured process that integrates information security ...

  8. Federal Information Processing Standards - Wikipedia

    en.wikipedia.org/wiki/Federal_Information...

    The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer situs of non-military United States government agencies and contractors. [1]

  9. Federal Acquisition Regulation - Wikipedia

    en.wikipedia.org/wiki/Federal_Acquisition_Regulation

    If an agency is hiring experts, read over 5 USC 3109, Employment of Experts and Consultants, Temporary or Intermittent to see if it applies to FAR 37.104(f). Office of Personnel Management (OPM) has established requirements that apply in acquiring personal services for experts or consultants in this manner (for example, benefits, taxes ...