Security Target

Results: 819



#Item
521Low level waste / Nuclear energy in the United States / Depleted uranium / Nuclear Regulatory Commission / Nevada National Security Site / EnergySolutions / Environmental impact assessment / Low-level radioactive waste policy of the United States / Environment / Radioactive waste / Environmental economics

State comments on the Nevada Test and Training Range Depleted Uranium Target Disposal Draft Environmental Assessment (September 2004)

Add to Reading List

Source URL: www.state.nv.us

Language: English - Date: 2004-10-19 14:43:13
522Information systems / Data security / Information technology management / Database management systems / Data management / Management information system / Enterprise resource planning / Customer relationship management / Microsoft Certified Professional / Business / Computing / Technology

Glossary of Job Descriptions Our Glossary of Job Descriptions can help you better target the professionals you need. Use the descriptions on the following pages as a starting point, and tailor them to match your specific

Add to Reading List

Source URL: www.roberthalf.com

Language: English - Date: 2014-09-29 17:55:05
523Electronics / Wireless security / Password / Network security / Wi-Fi / Home network / Two-factor authentication / Internet privacy / Email / Computing / Computer network security / Internet

As a user with access to sensitive corporate or government information at work , you are at risk at home. In order to gain access to information typically housed on protected work networks, cyber adversaries may target y

Add to Reading List

Source URL: dodcio.defense.gov

Language: English - Date: 2014-07-25 15:12:01
524Investment / Financial services / Personal finance / National Institute on Retirement Security / Defined benefit pension plan / Defined contribution plan / Retirement / Social Security / Target benefit plan / Pension / Financial economics / Economics

Microsoft Word - Bang for the Buck FAQ

Add to Reading List

Source URL: www.nirsonline.org

Language: English - Date: 2004-01-01 02:00:53
525Government Communications Headquarters / Evaluation / Security Target / Systems engineering process / CESG Listed Advisor Scheme / Security / Common Criteria / Computer security / Article 11 of the European Convention on Human Rights / Cheltenham

CTAS Principles & Methodology

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2012-08-23 00:20:47
526Soil contamination / Magnesium in biology / Physiology / Plant physiology / Toxicity / Datagram Transport Layer Security / Benzene / Chemistry / Biology / Toxicology

5.0  INITIAL SITE CHARACTERIZATION AND COMPARISON WITH DEFAULT  TARGET LEVELS AND WATER QUALITY CRITERIA  5.1  MRBCA OBJECTIVE OF INITIAL SITE CHARACTERIZATION 

Add to Reading List

Source URL: www.dnr.mo.gov

Language: English - Date: 2006-04-07 15:22:15
527National security / Computer network security / Common Criteria / Protection Profile / Computer security / Ohta / Evaluation Assurance Level / Security Target / Voice over IP / Evaluation / Security / Crime prevention

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: [removed]April-14 Previous editions:

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2014-04-29 04:42:10
528United States / Portland metropolitan area / Pacific Northwest / West Coast of the United States / Supplemental Nutrition Assistance Program / Food security / Poverty in the United States / Snap / Willamette Valley / Geography of the United States / Oregon

FFY2014 Oregon OFNP/SNAP-Ed Plan Section A. Identifying and Understanding the Target Audience Section A. Identifying and Understanding the Target Audience NEEDS ASSESSMENT METHODOLOGY & FINDINGS

Add to Reading List

Source URL: extension.oregonstate.edu

Language: English - Date: 2014-01-03 19:10:18
529Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.dmaps.wv.gov

Language: English - Date: 2012-12-19 10:53:32
530Data security / Virtual tape library / Data synchronization / Backup / Unitrends / ExaGrid / FalconStor Software / Data deduplication / Data Domain / Computing / Backup software / Information

Vendor Landscape: Disk Backup Point your efforts at the best target to meet your backup needs. Vendor Landscape: Disk Backup Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice.

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-08-05 17:06:03
UPDATE