Security Target

Results: 819



#Item
131Common Criteria / Security Target / Evaluation Assurance Level / Penetration test / Professional certification / Evaluation / Computer security / Thought

Indian CC Certification Scheme (IC3S) Certification Report Report Number: STQC/CCCR

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:45:30
132DNS spoofing / Hacking / Name server / Resolver / Forwarder / Cooperative Association for Internet Data Analysis / Query / Target Corporation / Internet / Domain name system / Computing / Computer network security

Strange Things Found in an Open Resolver Survey Duane Wessels The Measurement Factory/CAIDA WIDE+CAIDA Workshop #9

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:57
133Embargo / United Nations Security Council Resolution / International relations / Arms control / Arms embargo

United Nations Arms Embargoes: Their Impact on Arms Flows and Target Behaviour Summary • Arms embargoes have frequently been employed by the United Nations Security Council (UNSC) as a form of sanction.

Add to Reading List

Source URL: www.ic-wish.org

Language: English - Date: 2008-01-25 22:24:02
134Military technology / Stock / Shooting range / Security / Destruction / Semi-automatic rifles / SIG SG 550 / Walther LGR / Accurizing / Benchrest shooting / Rifle

F Class Target Shooting Techniques Level 1 Forward This course comprises: - Course Instruction contents (1 page) - Course Instruction (20 pages)

Add to Reading List

Source URL: www.vra.asn.au

Language: English - Date: 2013-08-16 08:19:30
135International sanctions / Arms embargo / Political economy / Embargo / Arms industry / Stockholm International Peace Research Institute / Economic sanctions / United Nations Security Council Resolution / International relations / Arms control / International trade

United Nations Arms Embargoes: Their Impact on Arms Flows and Target Behaviour

Add to Reading List

Source URL: www.pcr.uu.se

Language: English - Date: 2015-01-15 07:51:45
136Network architecture / Internet protocols / Internet / Internet privacy / Blue Coat Systems / Reverse proxy / Network protocols / Proxy server / Application delivery network / Network performance / Computing / Computer networking

Blue Coat Systems, Inc. Blue Coat ProxySG S400 and S500 running SGOS v6.5 Security Target Document Version: 1.4 Prepared for:

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2015-03-06 05:06:19
137Crimes / Anti-theft system / Financial institutions / Institutional investors / Law / Theft / Property / Insurance / Crime / Crime prevention / Security

Are your business premises an easy target for thieves? Having equipment stolen from your business premises is expensive, inconvenient and frustrating. That’s why it’s essential to take appropriate measures to protect

Add to Reading List

Source URL: www.datadotdna.com

Language: English - Date: 2010-07-07 00:00:42
138Action / Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / National Information Assurance Partnership / FIPS 140-2 / Evaluation / Computer security / Security

F2-0805-004_1_ Secure Systems Limited Silicon Data Vault ® Security Target1.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
139Crime prevention / Security / Anti-theft system / Theft / Motor vehicle theft / Insurance / Crime / Crimes / Car theft

Is your car an easy target for thieves? Having your car stolen is expensive, inconvenient and frustrating. That’s why it’s essential to take appropriate measures to protect your valuable asset. DataDotDNA® is a popu

Add to Reading List

Source URL: www.datadotdna.com

Language: English - Date: 2010-07-06 23:54:58
140Common Criteria / Public key certificate / Security Target / Information security / Computer security / Evaluation / Security

PDF Document

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-12-16 08:00:00
UPDATE