Security Target

Results: 819



#Item
71Protection Profile / Software / Security Target / Integrity / JavaScript / Evaluation / Computing / Common Criteria

JIL-Application-note-on-PP0084-v1-1

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-08-25 01:47:21
72Conservation biology / Philosophy of biology / Target Corporation / Threat / Stress / Cyberwarfare / Biology / Computer security / Conservation

Sample Formatted Keys for Miradi Figures Key Strategy Intermediate Result Conservation Target

Add to Reading List

Source URL: www.miradi.org

Language: English
73Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Security Target / Protection Profile / Linux kernel / Linux / Red Hat / Computer security / Computing / Software

Microsoft Word - HP_RHEL4_security_target-v2.4.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
74Internet protocols / Secure communication / Cryptography standards / X.509 / Transport Layer Security / PKCS / Common Criteria / Protection Profile / Security Target / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - GSKIT_7d-ST.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
75Security / Law enforcement / Public safety / Police / Target Corporation / Counties of England / National security / Thames Valley Police

Microsoft Word - Final version for Q2 report v15 - NFA amendmentdoc

Add to Reading List

Source URL: www.thamesvalley.police.uk

Language: English - Date: 2014-05-29 04:55:37
76Background check / Law enforcement / Security / Government / Law / Criminal Records Bureau / Criminal records / Employment / Recruitment

Subject: CHILD PROTECTION: PRE- EMPLOYMENT CHECKING OF PERSONS TO WORK IN SCHOOLS – NEW ARRANGEMENTS Target Audience:

Add to Reading List

Source URL: www.belb.org.uk

Language: English - Date: 2008-03-27 07:25:08
77Router / Server appliance / Security Target / 3Com / Hewlett-Packard / Open Shortest Path First / Computer network / Transmission Control Protocol / Computing / Computer hardware / Networking hardware

HP Routers EAL2 Security Target Version: 1.07 Aug. 20, 2010 Prepared by: Hewlett-Packard Development Company, L.P.

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-04 05:06:56
78ISO standards / Computing platforms / Smart cards / Java Card / Java / Common Criteria / Sun Microsystems / Security Target / Computing / Cross-platform software / Java platform

Microsoft Word - PP-JCS-Open-v2.6_19Apr10.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:27:12
79Electronic commerce / Payment systems / Evaluation / Computing / Common Criteria / Computer network security / Security Target / Poi / Protection Profile / ISO standards / Entertainment / Personal life

CC_PP_CASWG_POI_V2.0_26 November_2010_for evaluation

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:22:10
80Ethics / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Evaluation Assurance Level / Protection Profile / Security Target / Validation / Evaluation / Computer security / Thought

National Information Assurance Partnership Common Criteria Certificate is awarded to CloudShield Technologies

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2012-06-26 12:37:49
UPDATE