<--- Back to Details
First PageDocument Content
Action / Protection Profile / Security Target / Security / Information technology management / Cryptographic Module Testing Laboratory / Evaluation Assurance Level / Evaluation / Computer security / Common Criteria
Date: 2009-10-08 10:40:04
Action
Protection Profile
Security Target
Security
Information technology management
Cryptographic Module Testing Laboratory
Evaluation Assurance Level
Evaluation
Computer security
Common Criteria

Microsoft Word - CCpart1v2.4rev256.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Download Document from Source Website

File Size: 719,63 KB

Share Document on Facebook

Similar Documents

Smartcard IC Platform Protection Profile Version 1.0 Julydeveloped by

DocID: 1uLi4 - View Document

DP-1 Profile of General Population and Housing Characteristics: Demographic Profile Data NOTE: For more information on confidentiality protection, nonsampling error, and definitions, see http://www.census.gov

DocID: 1uE3f - View Document

DP-1 Profile of General Population and Housing Characteristics: Demographic Profile Data NOTE: For more information on confidentiality protection, nonsampling error, and definitions, see http://www.census.gov

DocID: 1uE1R - View Document

C A S E S T UDY Wunderlich invests in ransomware protection Malwarebytes helps proactively protect company and customer data Business profile

DocID: 1uA57 - View Document

Legal Protection by Design in the Smart Grid Privacy, data protection & profile transparency Prof. mr. dr. Mireille Hildebrandt of Radboud University Nijmegen

DocID: 1uvvX - View Document