Security Target

Results: 819



#Item
41MAIK MORGENSTERN / CTO AV-TEST Internet Security Days 2015 EVERYTHING IS A TARGET YOUR HEALTH DATA IS NEXT

MAIK MORGENSTERN / CTO AV-TEST Internet Security Days 2015 EVERYTHING IS A TARGET YOUR HEALTH DATA IS NEXT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2015-09-21 03:31:29
42Item Title  Supporting document FW – Evaluation Activities for Stateful Reviewer Traffic Filter Firewalls cPP-V0.3  German

Item Title Supporting document FW – Evaluation Activities for Stateful Reviewer Traffic Filter Firewalls cPP-V0.3 German

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-03-28 12:01:33
43FORT FOX HARDWARE DATA DIODE  Security Target Common Criteria FFHDD – EAL4+  Classification INTERNAL

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification INTERNAL

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:44:04
44Leifheit AG Recommendation: Risk:  Price Target:

Leifheit AG Recommendation: Risk: Price Target:

Add to Reading List

Source URL: ir.leifheit-group.com

Language: English - Date: 2014-11-10 03:20:53
45Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer  Cyber moving target techniques involve

Moving Target Techniques: Leveraging Uncertainty for Cyber Defense Hamed Okhravi, William W. Streilein, and Kevin S. Bauer Cyber moving target techniques involve

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:04:32
46Product certification / Standards organizations / Technischer berwachungsverein / Public key certificate / Protection Profile / Security Target / Professional certification

TÜV Rheinland Nederland B.V. Application form for Certification under the Netherlands Scheme for Certification in the area of IT Security (NSCIB) The name of the applicant must be the registered name of the legal body

Add to Reading List

Source URL: www.tuv-nederland.nl

Language: English - Date: 2015-11-05 07:37:42
47Soft Target: A Cybertech Thriller  Soft Target is a work of fiction. Names, characters, places, and incidents either are products of the author’s imagination or are used fictitiously. Any resemblance to actual events

Soft Target: A Cybertech Thriller Soft Target is a work of fiction. Names, characters, places, and incidents either are products of the author’s imagination or are used fictitiously. Any resemblance to actual events

Add to Reading List

Source URL: www.johntrudel.com

Language: English - Date: 2016-08-09 13:32:35
48WordPress Security Don’t Be a Target Will Chatham @willc www.willchatham.com

WordPress Security Don’t Be a Target Will Chatham @willc www.willchatham.com

Add to Reading List

Source URL: www.willchatham.com

Language: English - Date: 2016-06-03 22:29:26
49Transit is a Terrorist Target The following article was authored by the Mineta Transportation Institute’s Brian Michael Jenkins, Director of the Mineta National Transportation Safety and Security Center, and Bruce R. B

Transit is a Terrorist Target The following article was authored by the Mineta Transportation Institute’s Brian Michael Jenkins, Director of the Mineta National Transportation Safety and Security Center, and Bruce R. B

Add to Reading List

Source URL: transweb.sjsu.edu

Language: English - Date: 2016-05-31 12:31:09
50Proceedings on Privacy Enhancing Technologies ; ):22–39  Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18