Security Target

Results: 819



#Item
21Computer security / Computing / Data security / Cryptography / Crime prevention / Tests / Common Criteria / Protection Profile / Security Target / Evaluation / Information security / Evaluation Assurance Level

Microsoft Word - CCBusinessUsersSeminarOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:45
22Computer security / Computing / Security / Security Target / Common Criteria / Evaluation Assurance Level / Ohta / Protection Profile / Voice over IP

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: June-10 Previous editions:

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
23Business / Evaluation / Computer security / ISO standards / Standards organizations / Common Criteria / Quality management / Security Target / ISO/IEC JTC 1 / Quality management system / ISO/IEC 17025 / Requirement

Microsoft PowerPoint - 4. CC-SKN-CCTL-LabRequirement.pptx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:26:02
24Security / Secure communication / Economy / E-commerce / Information privacy / Payment cards / Cryptography / Data breach / Computer security / Payment card industry / Payment terminal / Hackers: Heroes of the Computer Revolution

Small businesses globally are a prime target for cybercriminals. DON’T LEAVE YOUR BUSINESS OPEN TO ATTACK When your payment card data is breached, the fallout can strike quickly.

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-07-06 20:56:33
25Computing / Control flow / Eval / Sequence container / Software engineering / Security Target / Common Criteria

Item Title Supporting document ND – Evaluation Activities for Network Reviewer Device cPP -V0.3 Eunkyoung Yi

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-03-28 12:01:47
26Security / Computer security / Cyberwarfare / Secure communication / Cybercrime / Computer network security / Data security / Data breach / Balabit / Threat / Insider threat / Cyber-attack

www.balabit.com Why do companies need User Behavior Analytics? "Only amateurs attack machines; professionals target people. And any solutions will have to target the people problem, not the math problem."1

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-08-13 13:21:12
27Computer security / Evaluation / Knowledge / Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Product certification / Professional certification / Tests / Common Criteria Testing Laboratory

Microsoft Word - D06-Guidance to Applicants-Issue-03.docx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
28Business / Trade / Commerce / Shops / Malnutrition / Urban decay / Food desert / Food security in the United States / Grocery store / Convenience store / Supplemental Nutrition Assistance Program / Target Corporation

JulyFood Desert to Food Oasis Promoting Grocery Store Development in South Los Angeles Nicky Bassford, MPP

Add to Reading List

Source URL: www.chc-inc.org

Language: English - Date: 2013-09-09 17:42:36
29Federal assistance in the United States / Social programs / Government / Welfare economics / Low-Income Home Energy Assistance Program / United States Department of Health and Human Services / Income distribution / Welfare / Supplemental Security Income / Unemployment benefits / Social Security / Home Energy Assistance Target

ALLOCATION PLAN FOR THE LOW INCOME HOME ENERGY ASSISTANCE PROGRAM BLOCK GRANT AS APPROVED ON SEPTEMBER 3, 2015

Add to Reading List

Source URL: www.ct.gov

Language: English - Date: 2015-09-14 15:00:28
30Data security / Computer security / Security / Crime prevention / Cryptography / Common Criteria / Protection Profile / Security Target / Information security / Evaluation / Evaluation Assurance Level / Cryptographic Module Testing Laboratory

Microsoft Word - CCDevelopersSeminar-marketingOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
UPDATE