To view the contents of this post, you must be authenticated and have the required access level.
IT Security E-Learning Video Guides
To view the contents of this post, you must be authenticated and have the required access level.
Software term of use
To view the contents of this post, you must be authenticated and have the required access level.
Software Audit Circular
To view the contents of this post, you must be authenticated and have the required access level.
Software Management Policy
To view the contents of this post, you must be authenticated and have the required access level.
NUS Cloud Policy
To view the contents of this post, you must be authenticated and have the required access level.
NUS DMP Appendices
To view the contents of this post, you must be authenticated and have the required access level.
HPC Cluster Security Baseline
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Red Hat Enterprise Linux OS Baseline Security Standard 2.0
To view the contents of this post, you must be authenticated and have the required access level.
Red Hat Enterprise Linux OS Baseline Security Standard 1.0
To view the contents of this post, you must be authenticated and have the required access level.