Security Target

Results: 819



#Item
541Cold War / Ray S. Cline / National security / Target analysis / Defense Intelligence Agency / Military intelligence / Intelligence / Military science / Central Intelligence Agency / McLean /  Virginia

Introduction[removed]THE CAESAR, POLO, AND ESAU

Add to Reading List

Source URL: permanent.access.gpo.gov

Language: English - Date: 2012-08-08 12:01:15
542National security / Disk encryption / Computer security / Computer virus / Internet security / Cyberwarfare / Public safety / Computer network security / Security / Crime prevention

Security Awareness Program Learning Objectives By Aron Warren Last Update[removed] Module 1: You are a target

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:07
543Classified information / Data privacy / Declassification / Disclosure / United States Department of Homeland Security / Records management / National Archives and Records Administration / Information Security Oversight Office / Target Corporation / Government / Information / Business

FISCAL YEAR 2009 ANNUAL PERFORMANCE PLAN _________________________________ _________________________________

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2012-03-08 16:37:45
544Target date fund / Mutual fund / Asset allocation / Pension / Social Security / Defined contribution plan / Target Corporation / Hedge fund / Collective investment scheme / Financial economics / Investment / Finance

Investment Company Advertising: Target Date Retirement Fund Names and Marketing

Add to Reading List

Source URL: edgar.sec.gov

Language: English - Date: 2010-06-21 10:21:42
545Software / Common Criteria / Protection Profile / Security Target / National Information Assurance Partnership / Evaluation Assurance Level / Mac OS X / Operating system / Security-evaluated operating system / Computer security / Evaluation / Computer architecture

Common Criteria Certification: Apple’s Ongoing Commitment to Security Introduction Apple has always been committed to providing the safest, most user-centered computing experience possible. Mac OS X is built on a rock-

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2007-06-05 20:38:44
546Crime prevention / National security / Computing / Password / Phishing / Security awareness / Email / Password policy / Password strength / Security / Computer security / Public safety

Hardening The HumanOS Executive Summary Computers store, process and transfer data that is valuable to your organization. As a result, they have been the primary target for cyber attackers. Years ago, exploiting computer

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-06-20 07:36:29
547Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.caloes.ca.gov

Language: English - Date: 2014-07-31 18:02:20
548National security / Crime / Public safety / Crime prevention / Environmental psychology / Crime prevention through environmental design / Natural surveillance / Target hardening / Environmental design / Criminology / Security engineering / Law enforcement

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN Crime Prevention Through Environmental Design, or CPTED, examines crime problems and the ways various features of the environment afford opportunities for undesirable and unw

Add to Reading List

Source URL: www.hamiltonpolice.on.ca

Language: English - Date: 2014-09-14 10:11:17
549Sponsor / Hewlett-Packard / Target Corporation / Economy of the United States / Computing / Advertising / Computer hardware

IASIR INCREASING PUBLIC SAFETY WITH PRIVATE SECURITY Protecting the Future Through the Partnership of Security and Regulation The major international trends Sponsorship Kit

Add to Reading List

Source URL: www.iasir.org

Language: English - Date: 2013-09-12 19:36:32
550Networking hardware / Hewlett-Packard / Technology / Network management / Common Criteria / Protection Profile / National Information Assurance Partnership / Security Target / Evaluation Assurance Level / Evaluation / Computing / Computer security

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-11-18 10:50:18
UPDATE