Security Target

Results: 819



#Item
201Security Target / Evaluation Assurance Level / Protection Profile / Common Criteria / Quality assurance / Security-evaluated operating system / Evaluation / Computer security / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-027 CR Certification Report Issue[removed]December[removed]Toshiba T6ND5 HW version 5

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:34
202Action / Evaluation Assurance Level / Security Target / Crime prevention / National security / Unidirectional network / Common Criteria / Protection Profile / Computer security / Evaluation / Security / Networking hardware

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification PUBLIC

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
203Security / Cyberwarfare / Evaluation Assurance Level / Common Criteria / Security Target / Protection Profile / AirMagnet / Integrity / Threat / Computer security / Evaluation / Computer network security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-011 CR Certification Report Issue[removed]December[removed]AirMagnet Enterprise System 8.5

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:39
204Security / Gun safety / Firearm / Hunting / Firearm safety

MOUNTAIN SAFETY COUNCIL PRESS RELEASE 12 March, 2010 Positively identify your target beyond all doubt. That is the message of Mr Mike Spray, Firearms and Hunter Training Programme Manager for NZ Mountain Safety Council,

Add to Reading List

Source URL: www.mountainsafety.org.nz

Language: English - Date: 2010-03-15 19:40:03
205Protection Profile / Common Criteria / Security Target / Penetration test / Evaluation / Computer security / Evaluation Assurance Level

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-010 CR Certification Report Issue[removed]July[removed]Motorola RFS7000 RF Switch

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:32
206Email / Internet privacy / S/MIME / Email encryption / Transport Layer Security / Internet security / Certificate authority / Public key infrastructure / Pretty Good Privacy / Cryptography / Public-key cryptography / Key management

White Paper A Guide to Secure Email ABOUT THIS WHITE PAPER AND TARGET AUDIENCE This document is a whitepaper discussing the concept of secure email and the way in which M86 Security enables secure

Add to Reading List

Source URL: enclavedatasolutions.com

Language: English - Date: 2011-03-27 21:52:43
207Evaluation Assurance Level / Common Criteria / Security Target / Protection Profile / Cimcor / Evaluation / Computer security / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-019 CR Certification Report Issue[removed]Special Processing Indicator Filter version 1.2

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
208National security / Action / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Computer security / Public safety / Evaluation / Security / Crime prevention

Trusted Security Filter, Security Target

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2014-01-20 10:16:29
209Security / ISO standards / FIPS 140-2 / Common Criteria / Protection Profile / Accreditation / Security Target / Cryptographic Module Testing Laboratory / FIPS 140-3 / Computer security / Cryptography standards / Evaluation

サブプログラムの名称

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-04-16 20:40:31
210Botnets / Rootkits / Zeus / Identity theft / Malware / Bank / Phishing / Cybercrime / Computer crimes / Crime

whitepaper: SMEs and Cyber Heists SMEs and Cyber Heists CYBER CRIMINALS NOW TARGET SMALL / MEDIUM ENTERPRISES LACKING SOPHISTICATION AND APPROPRIATE SECURITY, SMES MAKE GREAT TARGETS FOR CYBER GANGS

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-01-17 14:15:16
UPDATE