Common Criteria

Results: 1278



#Item
771National security / Computer network security / Common Criteria / Protection Profile / Computer security / Ohta / Evaluation Assurance Level / Security Target / Voice over IP / Evaluation / Security / Crime prevention

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: [removed]November-13 Previous editions:

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-11-21 08:12:00
772Linguistics / Common Core State Standards Initiative / Reading comprehension / Readability / Literature circle / Core Knowledge Foundation / Education / Reading / Education reform

Criteria for Curriculum Materials Common Core State Standards in ELA & Literacy, Grades 4-12 Introduction The following statements were developed by the authors of the Common Core State Standards. These criteria are desi

Add to Reading List

Source URL: education.nh.gov

Language: English - Date: 2013-03-10 05:00:00
773Computing / Computer network security / Evaluation Assurance Level / Computer security / Kernel / Common Criteria / Linux kernel / Evaluation / Software / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 MR Maintenance Report Issue 4.0, 29 April[removed]Thales Operator Terminal Adapter (OTA)

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2014-04-29 04:33:38
774National security / Crime prevention / National Information Assurance Partnership / Common Criteria / Software quality / Software assurance / National Security Agency / Vulnerability / Information security / Security / Computer security / Evaluation

The Honorable Rob Portman

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-18 01:00:00
775Credential / Identity management / Knowledge / National Academic Recognition Information Centre / Bologna Process / Education in Australia / General Educational Development / Common Criteria / World Education Services / Education / Educational policies and initiatives of the European Union / Evaluation

Approaches to International Degree Recognition:

Add to Reading List

Source URL: ierf.org

Language: English - Date: 2013-04-23 17:14:45
776Common Criteria Evaluation and Validation Scheme / Common Criteria / Common Criteria Testing Laboratory / Protection Profile / ITSEC / Trusted Computer System Evaluation Criteria / Information assurance / CTCPEC / Computer security / Evaluation / National Information Assurance Partnership

Common Criteria IT Security Evaluation & the National Information Assurance Partnership The international Common Criteria Recognition Arrangement (CCRA) brings together 26 nations who agree to accept a unified approach

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2013-08-27 09:12:31
777Evidence

-2therefore be “defined…by reference to objective criteria” and must bear “some rational relationship” to the common issues” Hollick v. Metropolitan Toronto (Municipality), 2001 SCC 68 at paras 17, [removed].

Add to Reading List

Source URL: www.wagners.co

Language: English - Date: 2014-10-07 18:18:23
    778Linguistics / Common Core State Standards Initiative / Reading comprehension / Readability / Literature circle / Core Knowledge Foundation / Education / Reading / Education reform

    Criteria for Curriculum Materials Common Core State Standards in ELA & Literacy, Grades 4-12 Introduction The following statements were developed by the authors of the Common Core State Standards. These criteria are desi

    Add to Reading List

    Source URL: www.education.nh.gov

    Language: English - Date: 2013-03-10 05:00:00
    779Software / Common Criteria / Protection Profile / Security Target / National Information Assurance Partnership / Evaluation Assurance Level / Mac OS X / Operating system / Security-evaluated operating system / Computer security / Evaluation / Computer architecture

    Common Criteria Certification: Apple’s Ongoing Commitment to Security Introduction Apple has always been committed to providing the safest, most user-centered computing experience possible. Mac OS X is built on a rock-

    Add to Reading List

    Source URL: images.apple.com

    Language: English - Date: 2007-06-05 20:38:44
    780Common Criteria / Protection Profile / Evaluation Assurance Level / Identity assurance / Security-evaluated operating system / Safelayer Secure Communications / Computer security / Evaluation / Security

    POSITION PAPER DIGITAL IDENTITY SECURITY: SOGIS-MRA AS A COMMON FRAMEWORK TOWARDS DIGITAL TRUST SUMMARY AND RECOMMENDATIONS: The concept of digital identity is tightly linked to personal data protection and privacy prote

    Add to Reading List

    Source URL: eurosmart.com

    Language: English - Date: 2014-07-11 09:04:03
    UPDATE