CSRC

Results: 4036



#Item
401

<4D6963726F736F667420576F7264202D20312D312020D5D0B9C9CBB5C3F7CAE9A3A8C9EAB1A8B8E5A3A92E646F63>

Add to Reading List

Source URL: www.csrc.gov.cn

Language: Chinese - Date: 2015-04-10 15:45:03
    402

    PDF Document

    Add to Reading List

    Source URL: www.csrc.gov.cn

    Language: Chinese - Date: 2015-04-10 15:41:40
      403Advanced Encryption Standard / Hashing / Disk encryption / FIPS 140-2 / HMAC / Key size / FIPS 140 / AES instruction set / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

      Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-03-24 07:36:43
      404

      PDF Document

      Add to Reading List

      Source URL: www.csrc.gov.cn

      Language: Chinese
        405FIPS 140-2 / FIPS 140 / Astro / Zeroisation / Cryptography / Cryptography standards / Advanced Encryption Standard

        Microsoft Word - 401f - Astro_Subscriber_MACE_Security_Policy_Level_3_RS.MotAccepted.doc

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-04-13 09:19:12
        406Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

        Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-01-14 11:56:40
        407Data security / National security / Department of Defense Information Technology Security Certification and Accreditation Process / Department of Defense Information Assurance Certification and Accreditation Process / System Security Authorization Agreement / National Industrial Security Program / Defense Information Systems Agency / Information security / Information assurance / Security / Computer security / United States Department of Defense

        Department of Defense INSTRUCTION NUMBERDecember 30, 1997 ASD(C3I)

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2007-09-19 01:00:00
        408Sociology / Proxy voting / Absentee ballot / Electoral fraud / Ballot / Voting system / Uniformed and Overseas Citizens Absentee Voting Act / Federal Voting Assistance Program / Overseas Vote Foundation / Elections / Politics / Government

        Microsoft Word - Limited Proxy Voting for UOCAVA Voters_Final 29 JUL 2010_

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2012-05-09 10:49:58
        409Computing / Crime prevention / National security / Computer network security / Information security / Vulnerability / Validation / Security controls / Systems development life-cycle / Security / Computer security / Data security

        Chapter 6. Integrating Computer Security into the Systems Lifecycle Chapter 6. Integrating Computer Security Into the Systems Lifecycle Chapter 6. Integrating Computer Security into the Systems Lifecycle

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2007-09-19 01:00:00
        410Computer security / Firmware / Safenet / Cryptographic Module Validation Program / Computing / Security / Cryptography standards / FIPS 140-2 / Cisco Catalyst

        http://csrc.nist.gov/groups/STM/cmvp/documents140val-all.htm Certificate Number Validation / Posting Date

        Add to Reading List

        Source URL: istorage-uk.com

        Language: English - Date: 2014-02-12 10:26:32
        UPDATE