Security Target

Results: 819



#Item
561George W. Bush / War on Terror / Protestantism / Contemporary history / National security / Counter-terrorism / War in Afghanistan / Bush family

2004 July 5 / Administration of George W. Bush, 2002 terror. The attacks of September the 11th took place in the United States, but their target was freedom, itself. All of Europe

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2012-07-17 13:32:14
562Food and drink / Food security / Security / Urban agriculture / Social vulnerability / Food / Sustainability / Poverty / Humanitarian aid / Environment / Development

ANALYSISOF TARGET GROUPS MANUAL FOR BOTTOM-UP-APPROACH IN FOOD SECURITY INTERVENTIONS

Add to Reading List

Source URL: karianet.org

Language: English - Date: 2011-10-18 06:43:01
563Common Criteria Evaluation and Validation Scheme / Thought / Ethics / Value / Common Criteria / Protection Profile / Evaluation Assurance Level / Government procurement in the United States / Security Target / Evaluation / National Information Assurance Partnership / Common Criteria Testing Laboratory

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2011-12-08 14:13:53
564Content management systems / Classified information / Data privacy / Declassification / Disclosure / Business / Records management / Target Corporation / Information Security Oversight Office / National Archives and Records Administration / Information / Government

DOC Document

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2014-02-12 14:56:55
565Computing / Software testing / Hacking / Electronic commerce / Cross-site scripting / Application security / Vulnerability / Exploit / Web application security / Computer security / Cyberwarfare / Computer network security

… White paper Web Application Security: GamaSec Solution 1. Web Applications: An attractive target How do you cost effectively defend web applications from attack? Your organization relies on

Add to Reading List

Source URL: www.alentus.com

Language: English - Date: 2011-04-06 12:15:34
566Common Criteria / Evaluation Assurance Level / Security Target / FIPS 140-2 / Windows / Protection Profile / Security-evaluated operating system / Evaluation / Computer security / Security

Microsoft Word - CR for WinMagic SecureDoc v1.0.doc

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
567Crime prevention / Data security / Information security / National security / Futures contract / Asset management / Public safety / Prevention / Management / Security / Computer security

Administration • Target Audience – Individuals who have self-assessment data collection responsibilities • Prerequisite: ASSET System training

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
568National security / Risk analysis / Information Risk Management / Information security / Information Technology Security Assessment / Asset / IT risk management / Critical infrastructure protection / Computer security / Security / Data security

Automated Security SelfAssessment Evaluation Tool (ASSET) Training Administration • Target Audience – Individuals who have self-assessment data

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
569Antivirus software / Computing / Cyberwarfare / Computer security / Computer network security / Malware / Botnet

TRAINING DATA The goal of the detection algorithms is to use training data in order to efficiently tell whether a given set of intercepted communication data contains messages to or from a target C2 network.

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:44:40
570Security / Credit / Electronic commerce / Credit card / Debit card / Identity document / Personally identifiable information / Credit history / Social Security number / Financial economics / Payment systems / Identification

Keep your good name. Refuse to be a target of identity crime. Protect Yourself from Identity Crime If you have been the victim of identity crime, you might not know it until you have been denied credit, received a bill f

Add to Reading List

Source URL: www.juneau.org

Language: English - Date: 2010-08-10 14:51:06
UPDATE