Security Target

Results: 819



#Item
591Common Criteria / Security Target / Evaluation Assurance Level / Protection Profile / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2007

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:14:55
592Security Target / Evaluation / Information security / Public safety / Prevention / Common Criteria / Security / Computer security / Data security

PREMIER MINISTRE Secrétariat général de la défense et de la sécurité nationale

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-09-28 09:24:08
593Evaluation / Crime prevention / Common Criteria / Protection Profile / Security Target / Information security / Password / National Security Agency / Authentication / Security / Computer security / National security

ASD-Approved Protection Profile Protection Profile for Mobile Device Fundamentals Version: 1.1

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-04-09 21:42:26
594Common Criteria / Security Target / Evaluation Assurance Level / Protection Profile / Vulnerability / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 3: Security assurance requirements August 1999

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:12
595Protection Profile / Evaluation Assurance Level / Security Target / National Information Assurance Partnership / ITSEC / Windows / Vulnerability / Security-evaluated operating system / Multilevel security / Computer security / Evaluation / Common Criteria

Understanding common criteria evaluation - technical note 02/03

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2011-01-25 08:00:05
596Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Systems engineering process / Cimcor / Cryptographic Module Testing Laboratory / Evaluation / Computer security / Security

PDF Document

Add to Reading List

Source URL: www.itsc.or.jp

Language: English - Date: 2011-11-14 19:42:55
597Crime prevention / Computer security / Vulnerability / Physical security / Counter-terrorism / Security management / Critical infrastructure protection / Security / National security / Public safety

Frontline Responder Training Course Module 8 Soft Target Assets and Vulnerabilities Module Overview & Objectives

Add to Reading List

Source URL: www.naleo.org

Language: English - Date: 2014-03-12 20:47:23
598Computer security / Data / Data security / Application firewall / Tunneling protocols / Firewall / IPsec / Computer network security / Computing / Network architecture

Enterprise Security Services Roadmap * Platform decisions may change target dates. Next Generation Firewalls

Add to Reading List

Source URL: cts.wa.gov

Language: English - Date: 2014-08-11 15:10:53
599Electronic warfare / Hacking / Military technology / FireEye /  Inc. / Advanced persistent threat / International Multilateral Partnership Against Cyber Threats / Cooperative Cyber Defence Centre of Excellence / Canadian government hackings / Cyber-security regulation / Cybercrime / Computer crimes / Cyberwarfare

Government Top Target for APT Attacks With a constant barrage of news about high-profile cyber attacks, 2013 was one of the most interesting years ever in the security arena. Headlines seemed ripped from a Tom Clancy no

Add to Reading List

Source URL: www.fireeye.com

Language: English - Date: 2014-08-11 22:30:03
600Computing / Email / Login / One-time password / Password notification email / Password policy / Access control / Security / Password

How to Log into FI$Cal 2.0 Supplemental Job Aid Date: [removed]Target Audience: All FI$Cal Roles

Add to Reading List

Source URL: www.fiscal.ca.gov

Language: English - Date: 2014-07-17 21:56:41
UPDATE