Security Target

Results: 819



#Item
571Protection Profile / Security Target / Address space layout randomization

AUSTRALIAN SIGNALS DIRECTORATE MANDATORY REQUIREMENTS ADDENDUM PROTECTION PROFILE FOR MOBILE DEVICE FUNDAMENTALS VERSION 1.1 DATED 12 FEB 2014 In accordance with the Protection Profile for Mobile Device Fundamentals (Ve

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-08-20 03:19:33
572Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: montanadma.org

Language: English - Date: 2012-06-07 12:19:33
573New Jersey / Ben Shahn / Education in the United States / New Deal agencies / United States Department of Agriculture / Roosevelt /  New Jersey / Farm Security Administration / Monmouth County /  New Jersey / New Jersey Digital Highway / Geography of New Jersey / Rutgers University / Coalition of Urban and Metropolitan Universities

Ben Shahn Target Age: High School Time Period:

Add to Reading List

Source URL: officialnj350.com

Language: English - Date: 2014-07-21 09:42:39
574Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / XTS-400 / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model June 2005

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:06
575Action / Protection Profile / Security Target / Security / Information technology management / Cryptographic Module Testing Laboratory / Evaluation Assurance Level / Evaluation / Computer security / Common Criteria

Microsoft Word - CCpart1v2.4rev256.doc

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:02
576National security / Internet / Computer network security / Internet privacy / Personal life / Personally identifiable information / Information security / Computer security / Email / Security / Computing / Crime prevention

2013 Year-End Policy Review PO1001 Information Security Policy Target Audience: All Users Summary: The intent of this policy is to explain the range of acceptable and unacceptable uses of State-provided information

Add to Reading List

Source URL: www.technology.wv.gov

Language: English - Date: 2014-01-27 15:59:55
577Financial services / Personal finance / Taxation in Canada / Social Security / Taxation in the United States / Mutual fund / Retirement / Pension / 401 / Financial economics / Investment / Finance

WHY TARGET DATE FUNDS? RRRR

Add to Reading List

Source URL: crr.bc.edu

Language: English - Date: 2013-07-09 16:12:30
578Cyberwarfare / Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Vulnerability / Computer security / Evaluation / Security

Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components July 2005

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:08
579Cyberwarfare / Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Vulnerability / Computer security / Evaluation / Security

Microsoft Word - CCpart3v2.4rev256.doc

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:02
580Professional certification / Thought / Value / Change management / Evaluation / Common Criteria / Security Target

Microsoft Word - AI011_1.0.doc

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-07-01 20:20:17
UPDATE