Security Target

Results: 819



#Item
441Separation kernel / Multilevel security / Protection Profile / Common Criteria / Kernel / Security Target / Evaluation Assurance Level / Computer security / Evaluation / Security

Separation Kernel Protection Profile Revisited: Choices and Rationale Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine Naval Postgraduate School Michael McEvilley

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-12-10 12:35:41
442Negligent infliction of emotional distress / Duty of care / Causation / Class action / Doe v. MySpace / Wrongful birth / Law / Tort law / Negligence

In re: Target Corporation Customer Data Security Breach Litigation, 14-MDL-2522, PAM/JJK

Add to Reading List

Source URL: blogs.reuters.com

Language: English - Date: 2014-12-05 17:20:21
443Malware / Target Corporation / Payment Card Industry Data Security Standard / Data breach / Cyberwarfare / MasterCard / Tron / Credit cards / Security / Computer security

CASE 0:14-md[removed]PAM Document 204 Filed[removed]Page 1 of 46 UNITED STATES DISTRICT COURT DISTRICT OF MINNESOTA In re: Target Corporation Customer Data Security Breach Litigation

Add to Reading List

Source URL: blogs.reuters.com

Language: English - Date: 2014-12-05 17:20:21
444Target date fund / Mutual fund / Asset allocation / Pension / Social Security / Defined contribution plan / Target Corporation / Hedge fund / Collective investment scheme / Financial economics / Investment / Finance

Investment Company Advertising: Target Date Retirement Fund Names and Marketing

Add to Reading List

Source URL: www.sec.gov

Language: English - Date: 2010-06-21 10:21:42
445Crime prevention / National security / Evaluation / Information security management system / Protection Profile / Security Target / Common Criteria / Evaluation Assurance Level / Capability Maturity Model / Computer security / Security / Data security

P3I – PROTECTION PROFILE PROCESS IMPROVEMENT Jeffrey R. Williams, Karen M. Ferraiolo Arca Systems, Inc. Phone: [removed]FAX: [removed]removed], [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
446Social Security / Economy of the United States / Internal Revenue Service / Identification / Treasury Inspector General for Tax Administration / Individual Taxpayer Identification Number / Tax return / Security / Income tax in the United States / Taxation in the United States / Government / Social Security number

Target Dates Have Not Been Established to Eliminate or Reduce Taxpayer Social Security Numbers From Outgoing Correspondence

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2010-12-03 16:05:01
447Computer network security / Crimes / Password / Crime prevention / National security / Electronic commerce / Spyware / Identity theft / Computer security / Security / Espionage / Cyberwarfare

What is personal information assurance? Why is it important? What‟s the real threat here? I couldn‟t possibly be a target, right? What do I need to know about Facebook and other social networking sites? What should I

Add to Reading List

Source URL: www.eur.army.mil

Language: English - Date: 2010-08-24 06:04:51
448Key management / National security / Evaluation / Crime prevention / Cryptography standards / Common Criteria / Protection Profile / Security Target / FIPS 140-2 / Cryptography / Computer security / Security

PROTECTION PROFILES FOR CERTIFICATE ISSUING & MANAGEMENT SYSTEMS A. Arsenault, US DoD Phone: [removed]FAX: [removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
449Energy / Indirect land use change impacts of biofuels / Directive on the Promotion of the use of biofuels and other renewable fuels for transport / Mandatory renewable energy target / Renewable energy / Low-carbon fuel standard / Sustainable biofuel / Environment / Biofuels / Sustainability

9 December[removed]NGO media advisory Biofuels: EU Energy Ministers must choose right path for the world’s climate & food security

Add to Reading List

Source URL: www.birdlife.org

Language: English - Date: 2014-06-09 10:01:04
450Security / Technology / Internet privacy / Social engineering / Malware / Social media / Social networking service / Computer security / Online shopping / Electronic commerce / Human development / Spamming

From the Desk of [Insert Name Here] The use of social media has exploded, with 255 million active users on Twitter and more than 1.2 billon on Facebook. Unfortunately, so too have the scams and attacks that target soci

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-29 12:54:23
UPDATE