CSRC

Results: 4036



#Item
891Cyber-security regulation / Cyberwarfare / United States Department of Homeland Security / Computer crimes

October 10, 2014 Via [removed] Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive (Stop[removed]Gaithersburg, MD[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 15:12:37
892VDX / Fibre Channel / Microsoft Visio / Brocade Communications Systems / Fibre Channel over Ethernet / XBR / United States Navy SEALs / Stock-keeping unit / Technology / Computing / Library automation / Software

TID[removed]5SUB-Brocade_Co[removed]V1_140sp (Brocade_14.10.22_V1.8) (ID 466)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 10:36:20
893Cryptographic software / HMAC / Hashing / FIPS 140 / Advanced Encryption Standard / Cisco IOS / Cisco Systems / Crypto++ / Network Security Services / Cryptography / Cryptography standards / Computing

Microsoft Word - IC2M Security Policy_rel(1.5).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-15 15:13:53
894United States Department of Homeland Security / Public safety / National security / Computer network security / Secure communication / Idaho National Laboratory / National Cybersecurity Center / National Cyber Security Division / International Cybercrime / Cyberwarfare / Security / Computer security

Before the Department of Commerce Washington, D.C. In the Matter of Experience With the Framework for Improving Critical Infrastructure Cybersecurity

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
895Instruction set architectures / Integrated development environments / Cross-platform software / X86 architecture / X86-64 / Cryptographic software / 64-bit / Itanium / Windows Server / Software / Computing / Computer architecture

RSA BSAFE Crypto-C Micro Edition 4.1 Security Policy Level 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-05 14:57:55
896Access control / FIPS 201 / Standards / Security token / Smart cards / Two-factor authentication / Cryptography / Authentication / SecurID / Security / Computer security / Identity management

Comments and Resolutions for Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-19 14:14:47
897Computer security / Crime prevention / Electronic commerce / Secure communication / Public safety / Computer network security / Security / Year of birth missing

Small Business Information / Cybersecurity Workshop Computer Security Division, Information Technology Laboratory Presenter

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 08:02:21
898Error detection and correction / Hashing / Cryptographic hash functions / Cryptographic software / HMAC / FIPS 140-2 / SHA-2 / FIPS 140 / SHA-1 / Cryptography / Cryptography standards / Spaceflight

Microsoft Word - 23g - ISS HA-ECT FIPS[removed]Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 08:43:12
899Crime prevention / National security / Computer security / Cryptography / Cisco Systems / UUNET / Attack / Network security / Certified Information Systems Security Professional / Security / Computer network security / Computing

Incident Response - Stopping Them Dead in Their Tracks Chair Jon David Lehman Brothers Panelists Robert Stone UUNET Technologies Jim Duncan

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
900Role-based access control / Role hierarchy / Mutual exclusion / Separation of duties / Mandatory access control / Security / Computer security / Access control

Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:37:28
UPDATE