CSRC

Results: 4036



#Item
421Security / Security engineering / Critical infrastructure protection / Cyberwarfare / Critical infrastructure / Computer security / PDD-62 / National Cyber Security Division / National security / United States Department of Homeland Security / Infrastructure

WHITE PAPER The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
422Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
423

证券市场快报 (2015年第56期 总第 3924期) 中国证券监督管理委员会 2015年3月30日

Add to Reading List

Source URL: www.csrc.gov.cn

Language: Chinese
    424IronKey / USB / PKCS / Key / Password / Skype security / Security token / Cryptography / Public-key cryptography / Cryptographic software

    Microsoft Word - 11c - H350 SP .doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-13 09:22:01
    425Crime prevention / National security / Data security / United States Agency for International Development / Information security / Trusted Computer System Evaluation Criteria / Vulnerability / Password / Access control / Security / Computer security / Public safety

    Last RevisedFunctional SeriesManagement Services ChapterInformation Systems Security Table of Contents

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    426National security / Computing / Cyberwarfare / National research and education network / Data security / Information security / Vulnerability / Network security / Libraries and the National Research and Education Network / Security / Computer security / Crime prevention

    NISTIR 4734, Foundations of a Security Policy for Use of the National Research and Educational Network

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-04 10:28:40
    427American Association of State Colleges and Universities / James Madison University / Intelligence and National Security Alliance

    James Madison University (JMU) Cyberintel Workshop Draft Agenda, April 20, 2015

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-13 20:13:04
    428Electronic voting / Election fraud / Information society / Voting system / Cryptography / Voting machine / End-to-end auditable voting systems / Voter-verified paper audit trail / Politics / Electoral systems / Elections

    Microsoft Word - EPSTEIN_TradeoffsPael.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-05-02 15:04:04
    429Windows Server / X86 architecture / Cryptographic software / Disk encryption / BitLocker Drive Encryption / X86-64 / Windows Embedded / Windows / Unified Extensible Firmware Interface / Microsoft Windows / Computer architecture / Software

    Microsoft Word - BitLocker Windows OS Loader (winload exe) SP.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-04-07 13:06:00
    430Aruba / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / US F1 Team / Auto racing / Cryptography standards / Aruba Networks / Computing

    Dell W-3000 and W-6000/M3 Mobility Controllers with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSLevel 2 January 26, 2015 This is to advise that the document entitled “Aruba 3000 and 6000/M3 Mobili

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-01-28 13:43:07
    UPDATE