CSRC

Results: 4036



#Item
431Computing / Computer law / Federal Information Security Management Act / Information technology management / National Institute of Standards and Technology / Information security / Performance measurement / Security controls / Security management / Computer security / Data security / Security

NIST SPRevision 1, Performance Measurement Guide for Information Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:52:35
432Computer network security / Routers / Cisco Catalyst / Cisco Systems / TACACS+ / Cisco IOS / TACACS / FIPS 140 / IPsec / Computing / Network architecture / Data

Microsoft Word - 3850_3650_Security_Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-20 12:34:19
433Electronics / Cryptographic Module Validation Program / Cisco Catalyst / Firmware / Cisco Systems / Cisco IOS / Cryptography standards / Computing / FIPS 140

http://csrc.nist.gov/groups/STM/cmvp/documents140val-all.htm Certificate Number Validation / Posting Date

Add to Reading List

Source URL: istorage-uk.com

Language: English - Date: 2014-02-12 10:26:57
434Computing / FIPS 140-2 / FIPS 140 / Cryptographic Module Validation Program / Aruba / Access control / Cryptography standards / Security / Aruba Networks

Dell W-620 and W-650 Mobility Controllers with Dell AOS FIPS Firmware Non-Proprietary Security Policy FIPSLevel 2 January 26, 2015 This is to advise that the document entitled “Aruba 620 and 650 Mobility Control

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:34
435

证券市场快报 (2015年第57期 总第 3925期) 中国证券监督管理委员会 2015年3月31日

Add to Reading List

Source URL: www.csrc.gov.cn

Language: Chinese - Date: 2015-04-02 19:04:01
    436Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

    NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-11-09 09:31:11
    437

    行政许可审核流程图

    Add to Reading List

    Source URL: www.csrc.gov.cn

    - Date: 2015-04-14 13:35:20
      438Computer security / Crime prevention / National security / Information security / Security risk / Vulnerability / Risk management / Password / Risk assessment / Security / Risk / Management

      ITL Bulletin, Is Your Replication Device Making an Extra Copy for Someone Else? (April 2015)

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-04-16 08:03:25
      439

      DOC Document

      Add to Reading List

      Source URL: www.csrc.gov.cn

      - Date: 2015-04-14 13:33:25
        440

        <4D6963726F736F667420576F7264202D20BDF0B7A2C0ADB1C8B8BED3A4CDAFD3C3C6B7B9C9B7DDD3D0CFDEB9ABCBBECAD7B4CEB9ABBFAAB7A2D0D0B9C9C6B1D5D0B9C9CBB5C3F7CAE9A3A8C9EAB1A8B8E532303134C4EA34D4C23239C8D5B1A8CBCDA3A92E646F63>

        Add to Reading List

        Source URL: www.csrc.gov.cn

        Language: Chinese - Date: 2015-04-10 04:00:57
          UPDATE