Security Target

Results: 819



#Item
291Class action / Allen v. Wright / Plaintiff / Lawsuit / Federal Rules of Civil Procedure / Pleading / MERS / Standing / Private Securities Litigation Reform Act / Law / Civil procedure / Civil law

In re: Target Corporation Customer Data Security Breach Litigation-Consumer Cases, MDL[removed]PAM/JJK)

Add to Reading List

Source URL: www.hldataprotection.com

Language: English - Date: 2014-12-23 15:29:51
292National security / Technology / Data collection / Anti-submarine warfare / Sonar / Anti-submarine weapon

APV-RT AUTONOMOUS PORTABLE VEHICLE RECOVERABLE TARGET for Anti-Submarine Warfare training Description

Add to Reading List

Source URL: www.rtsys.eu

Language: English - Date: 2014-12-22 03:43:21
293Internet / Computer-mediated communication / Social engineering / Phishing / Gmail / Hacker / Email address harvesting / SpamCop / Spamming / Computing / Email

Which email addresses are exposed on the internet and are a target for phishing attacks? It’s easy to understand why Security Awareness Training now is an essential part of your defense-in-depth.

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2013-06-07 16:44:33
294Security / Dangerous goods / Australian Dangerous Goods Code / Explosive material / Fireworks / Placard / Hazardous materials / Safety / Prevention

Using explosives for target practice is illegal

Add to Reading List

Source URL: mines.industry.qld.gov.au

Language: English - Date: 2013-12-10 00:28:56
295Common Criteria / Security Target / Crime prevention / National security / Protection Profile / Computer security / Security / Evaluation

DRAFT Supporting Document Mandatory Technical Document Evaluation Activities for Network Device

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-09-05 16:52:37
296Java platform / Computing platforms / Sun Microsystems / Java Card / Security Target / Java / Common Criteria / Protection Profile / Oracle Corporation / Computing / Cross-platform software / ISO standards

Java Card Protection Profile – Closed Configuration December 2012 Version 3.0 Security Evaluations

Add to Reading List

Source URL: www.oracle.com

Language: English
297Evaluation / Hardware-based full disk encryption / Common Criteria / Security Target / Key / Cryptographic protocol / Protection Profile / Password / Cryptography / Disk encryption / Computer security

DRAFT Supporting Document Mandatory Technical Document Full Drive Encryption: Encryption Engine

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-09-05 16:01:00
298Security Target / Eval / Evaluation / Computing / Common Criteria

Item Title Supporting document FDE – Encryption Engine-V0 11 Reviewer

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-02-27 15:31:27
299Common Criteria / Software testing / Security Target / Eval / Cyberwarfare / Vulnerability / Computer security / Computing / Evaluation

Item Title Supporting document FDE - Authorization Acquistion-V0 13 Reviewer

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-02-27 15:31:27
300Counter-terrorism / International relations / Allied Command Transformation / Definitions of terrorism / Strategic communication / Psychological Operations / United States Special Operations Command / Terrorism / National security / Security

STRATEGIC COMMUNICATION IN COUNTER TERRORISM: Target Audience Analysis, Measures of Effect and Counter Narrative Workshop-seminar: Expert’s Paper

Add to Reading List

Source URL: www.coedat.nato.int

Language: English - Date: 2015-02-06 09:31:29
UPDATE