Security Target

Results: 819



#Item
11Economy / Finance / Money / Investment banks / Primary dealers / Financial markets / Financial services / Close Brothers Group / Securities research / Security analysis / Leifheit / Volatility

Leifheit AG Recommendation: Risk: Price Target:

Add to Reading List

Source URL: ir.leifheit-group.com

Language: English - Date: 2014-08-28 10:25:59
12Computer security / Security / Computing / Evaluation Assurance Level / Security Target / Common Criteria / Protection Profile / Crime prevention / Cryptography / Information governance / National security / Evaluation

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:32
13Computer security / Computing / Prevention / Security Target / Common Criteria / Evaluation Assurance Level / Evaluation / Information security

Microsoft Word - Outline_CC_Developers.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
14Computing / Telecommunications equipment / Networking hardware / Server appliance / Computer networking / Router / Ericsson / Business

Security target for Ericsson SmartEdge Series Router SE100, SE600, SE1200, SE1200H running SEOS ver 11.1 Software

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-03-26 08:07:28
15Safety / Doors / Door furniture / Architecture / Prevention / Door / Security alarm / Garage door / Garage / Lock / Vehicle door

Vacation Security CHECKLIST A house that is properly secured, looks “lived in” and is watched by neighbors is a far less likely target for thieves. Follow this checklist to secure your home before your big trip!

Add to Reading List

Source URL: police.uci.edu

Language: English - Date: 2016-08-02 19:05:16
16Cybercrime / Computing / Security / Crime / Identity theft / Social engineering / Cryptography / Crime prevention / Phishing / Password / Computer security / Security hacker

Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-10-27 10:54:34
17Computer access control / Identity management / Computing / Computer security / Federated identity / Software requirements / TERENA / Security Assertion Markup Language / EduGAIN / GANT / Identity provider / GARR

Deliverable DNA2.1: Report on the identification of target groups and their requirements

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-07-21 05:59:16
18Computer security / Security / Computing / Software testing / Security Target / Vulnerability / Evaluation Assurance Level / Kernel / Common Criteria / Open-source movement

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
19ISO standards / Common Criteria / Security Target / Evaluation / Audit / Computing / Knowledge

Microsoft PowerPoint - 3. CC-KM-LabEmpanelment Process.pptx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:25:24
20Computer security / Computing / Computer network security / Cyberwarfare / Security / Videotelephony / Data security / Integrated Services Digital Network / Network access / Security Target / Firewall / Oids

gsmyndigheten for IT-sikkerhet Norwegian Certificattion Authority for IT Security Sertifisering SERTIT T-012 MR Main ntena

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:40
UPDATE