configuration auditing

  • 51Security-focused operating system — This is an alphabetical list of operating systems with a sharp security focus. Their order does not imply rank.In our context, Security focused means that the project is devoted to increasing the security as a major goal. As such, something can… …

    Wikipedia

  • 52Occupational hygiene — Occupational (or industrial in the U.S.) hygiene is generally defined as the art and science dedicated to the anticipation, recognition, evaluation, communication and control of environmental stressors in, or arising from, the workplace that may… …

    Wikipedia

  • 53Comparison of Linux distributions — Technical variations of Linux distributions include support for different hardware devices and systems or software package configurations. Organizational differences may be motivated by historical reasons. Other criteria include security,… …

    Wikipedia

  • 54OpenBSM — Developer(s) Apple Inc., FreeBSD Stable release 1.1p2 / 2009 08 02 Operating system Darwin, FreeBSD Available in …

    Wikipedia

  • 55Database security — concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links)… …

    Wikipedia

  • 56AIDA32 — was a freeware system information, diagnostics, and auditing program written by Tamas Miklos that runs on Microsoft Windows operating systems. It displays detailed information on the components of a computer. Information can be saved to file in… …

    Wikipedia

  • 57Lynis — infobox software name = lynis latest release version = 1.1.6 latest release date = 19 June 2008 operating system = Cross platform genre = audit tool license = GNU General Public License website = http://www.rootkit.nl/projects/lynis.htmlLynis is… …

    Wikipedia

  • 58Novell NetWare — NetWare loading. (August 22, 2006) Company / developer Novell, Inc. Working state Current Source model Closed so …

    Wikipedia

  • 59Backup — For other uses of Backup , see Backup (disambiguation). In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. The verb form is back up in two… …

    Wikipedia

  • 60Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… …

    Wikipedia