Library items tagged: references

Anonymous
Information and Guidelines on Logfiles LINX Best Current Practice – Traceability: https://www.linx.net/good/bcp/traceability-bcp-v1_0.html Information Commissioner’s Employee Monitoring code: http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/employment_practices_code.pdf
Anonymous
Janet Policies All sites connecting to Janet are required to abide by three policies that set out the rules for access to, use and protection of the network. These policies are set by JISC, who fund the network. The latest versions of these policies can be found through the Janet web site. Janet Acceptable Use Policy: http://community.ja.net/library/acceptable-use-policy
Anonymous
[Lindner] Lindner, P, Beisel, T, Resch, M, Imamura, T, Menday, R, Wieder, P, Erwin, D, GRIDWELTEN: User Requirements and Environments for GRID-Computing: http://www.hlrs.de/research/grids/gridwelten/gridwelten.pdf[visited 15/03/2005] Network Design [Hillier] Hillier, J, The use of firewalls in the UK e-Science grid: http://e-science.ox.ac.uk/events/firewall-workshop/FirewallIdeas.pdf [visited 15/03/2005] [PERT] Performance Enhancement and Reporting Team:
Anonymous
Section 2: Methods of Countering the Threats UCISA: Information Security Toolkit UCISA: Model Regulations SANS: Critical Security Controls
Anonymous
RFC is Request For Comments