CSRC

Results: 4036



#Item
971National security / Public safety / Computer security / Information security / Information Systems Security Association / Blancco / Security / Data security / Crime prevention

Total BS Security: Business-based Systems Security The good news: We have a lot of security solutions today. The bad news: We have a lot of security solutions today. Selecting your systems security solutions can be two o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
972Computer security / Electronic commerce / National security / Public key infrastructure / Protection Profile / Public key certificate / FIPS 140-2 / Common Criteria / Entrust / Cryptography / Public-key cryptography / Key management

PANEL SESSION: SECURITY REQUIREMENTS FOR PKIs Panel Chair: Panelists: Alfred W. Arsenault, Jr., NSA Marc LaRoche, Entrust

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
973Internet standards / Internet protocols / Computing / Authentication protocol / TSIG / Public-key cryptography / Password / Cryptography / Cryptographic protocols / Internet

Automatically Detecting Authentication Limitations in Commercial Security Protocols Stephen H. Brackin  Arca Systems, Inc. 303 E. Yates St. Ithaca, NY 14850

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
974Science / Information warfare / Computer science / Cryptography / Computer security / Peter J. Denning / Gene Spafford / Dorothy E. Denning / Psychological warfare / Security

NATIONAL COMPUTER SYSTEMS SECURITY AWARD PRESENTED TO DOROTHY E. DENNING OCTOBER 1999

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
975Computer security / Computer virus / Trend Micro Internet Security / Virus Bulletin / Virus / Malware / Avira / Norton AntiVirus / Avast! / Antivirus software / System software / Software

Antivirus Software Testing for the New Millenium Abstract: The nature of technology is changing rapidly; likewise, the nature of viral threats to the data dependent upon the technology is evolving. Thus, the technologie

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
976Computer network security / Network topology / Hacking / Software testing / Vulnerability / Topology / Computer network / Node / Optical fiber / Electronics / Electronic engineering / Cyberwarfare

Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks 1 T. H. Shake‚, B. HazzardÁ, D. Marquis‚ ‚Distributed Systems Group, ÁAdvanced Networks Group Lincoln Laboratory, Massachusetts Institute of

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
977Multilevel security / Palm OS / Computing

Conduit Cascades and Secure Synchronization Simon N. Foley, Department of Computer Science, University College, Cork, Ireland. ([removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
978Evaluation / Data security / National Information Assurance Partnership / Common Criteria / Capability Maturity Model / National Security Agency / Rainbow Series / Trusted Computer System Evaluation Criteria / Information security / Computer security / Security / Computing

The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM) Panel Chair: Ms. Mary D. Schanken National Security Agency 9800 Savage Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
979Software licenses / Protection Profile / Interoperability / Security Target / Proprietary software / Online shopping / Electronics / Knowledge / Multilevel security / Evaluation / Common Criteria / Computing

Thoughts and Questions on Common Criteria Evaluations Kenneth G. Olthoff National Security Agency

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
980Evaluation / Data security / Professional certification / Information security / Certification / Common Criteria / Cyber security standards / Standards / Computer security / Security

Certified vs Secure Chair Jon David Lehman Brothers Panelists Sarah Gordon IBM Tim Polk

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE