CSRC

Results: 4036



#Item
921Pseudorandom number generators / Operating system / Device driver / Entropy / IBM / HAL / Kernel / Embedded system / Cryptography / Computing / Software / System software

Application Support Architecture for a High-Performance, Programmable Secure Coprocessor Joan Dyer Ron Perez

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
922Cisco Systems / FIPS 140 / Cryptographic Module Validation Program / Electronics / Evaluation / Cryptography standards / Computing / Small form-factor pluggable transceiver

Microsoft Word - ONS Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-22 14:22:28
923Hypothesis testing / Categorical data / Pseudorandom number generator / Non-parametric statistics / Random number generation / Wald–Wolfowitz runs test / Statistical hypothesis testing / Statistical significance / Pseudorandomness / Statistics / Statistical tests / Randomness

Statistical Testing of Random Number Generators Juan Soto National Institute of Standards & Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
924Cyberwarfare / Trusted Information Systems / Firewall / Telecommuting / Operating system / Cryptography / Personal firewall / Computer network security / Security / Computer security

PANEL TITLE: Your Always-On Connection & the Telecommuter PANEL CHAIR: Peter Dinsmore, NAI Labs, Network Associates PANELISTS: Michael StJohns, Excite@Home

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
925Crime prevention / National security / Evaluation / Information security management system / Protection Profile / Security Target / Common Criteria / Evaluation Assurance Level / Capability Maturity Model / Computer security / Security / Data security

P3I – PROTECTION PROFILE PROCESS IMPROVEMENT Jeffrey R. Williams, Karen M. Ferraiolo Arca Systems, Inc. Phone: [removed]FAX: [removed]removed], [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
926Competition / Competitive intelligence / Strategic management / Security clearance / National security / Security / Market research / Management / Business intelligence

The Competitive Intelligence and National Security Threat from Website Job Postings Jay D. Krasnow, M.A. Georgetown University Communication, Culture and Technology Program

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
927National security / Public safety / Software development process / Data security / Capability Maturity Model / Security engineering / Information security / Computer security / ISO/IEC 21827 / Security / Software development / Crime prevention

Tutorial: Security Engineering Best Practices Instructor:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
928Cryptographic protocols / Email authentication / Email / Internet standards / S/MIME / X.509 / Cryptographic Message Syntax / MIME / PKCS / Cryptography / Public-key cryptography / Computing

Secure Electronic Mail: It’s Ready for Prime Time Panel Chair Russell Housley, SPYRUS Panelists John Pawling, J.G. Van Dyke & Associates Michael Elkins, Network Associates, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
929Mandatory Integrity Control / File system / Mandatory access control / Operating system / Data integrity / Loadable kernel module / Computer file / Kernel / Computer security / Security / System software

An Operating System Analog to the Perl Data Tainting Functionality Dana Madsen1 [removed] Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
930Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE