Security assurance

Results: 2582



#Item
121

CERIAS Tech ReportIntuitive security policy configuration in mobile devices using context profiling by Aditi Gupta, Markus Miettinen, N. Asokan Center for Education and Research Information Assurance and Securit

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2011-12-07 10:43:58
    122

    Information Security Training Programs The Challenge In accordance with the Federal Information Security Management Act (FISMA), a fundamental transformation in Federal Information Security (aka. Information Assurance, C

    Add to Reading List

    Source URL: www.rmf.org

    Language: English
      123

      Information Security Policy Policy Statement and Purpose Continuous availability of information is essential to the operation of Virginia Commonwealth University programs. Expanded use of computers and telecommunication

      Add to Reading List

      Source URL: www.assurance.vcu.edu

      Language: English
        124Computer security / Evaluation / Security / Crime prevention / Software quality / Data security / Evaluation Assurance Level / Common Criteria / Software assurance / Protection Profile / Validation / National Information Assurance Partnership

        Sumeet.Malhotra.Software Assurance Challenges for Systems Integrators.ppt

        Add to Reading List

        Source URL: swa.omg.org

        Language: English - Date: 2006-12-14 08:55:14
        125

        CONCENTRIC SUPERVISION OF SECURITY APPLICATIONS: AN ASSURANCE METHODOLOGY by Philip C. Hyland A Dissertation Submitted to the

        Add to Reading List

        Source URL: www.profsandhu.com

        Language: English - Date: 2008-02-07 14:26:16
          126

          Seccuris, an international information assurance company headquartered in Canada, provides clients with security and risk management consulting services, managed security services, security solution integration, and educ

          Add to Reading List

          Source URL: www.seccuris.com

          Language: English
            127Common Criteria / Protection Profile / ITSEC / Federal Office for Information Security / Evaluation Assurance Level / Computer security / Evaluation / Security

            Certification Report BSI-CC-PP

            Add to Reading List

            Source URL: sogis.eu

            Language: English - Date: 2013-02-14 10:22:09
            128Access control / National Security Agency / Multilevel security / Mandatory access control / Role-based access control / Common Criteria / Security-Enhanced Linux / Labeled Security Protection Profile / Evaluation Assurance Level / Computer security / Security / Evaluation

            Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

            Add to Reading List

            Source URL: www.niap-ccevs.org

            Language: English - Date: 2009-10-08 10:40:04
            129Nuclear strategies / Foreign relations of the Soviet Union / Nuclear warfare / Nuclear umbrella / Deterrence theory / South Korea / North Korea and weapons of mass destruction / North Korea–United States relations / International relations / Cold War / International security

            U.S. Extended Deterrence and Assurance for Allies in Northeast Asia Dr. Keith Payne, Study Director Thomas Scheber Kurt Guthe

            Add to Reading List

            Source URL: www.nipp.org

            Language: English - Date: 2015-01-09 23:07:51
            130Internet / Privacy / HTTP cookie / Online Privacy Protection Act / Personally identifiable information / P3P / In re Gateway Learning Corp. / Internet privacy / Ethics / Computing

            Assurance Systems, Inc. Privacy Policy This Privacy Policy was last updated on July 1, 2012. Overview At Assurance Systems, Inc. (“Assurance”) protecting our users privacy and security is a top priority. This privacy

            Add to Reading List

            Source URL: www.weebly.com

            Language: English - Date: 2012-12-14 15:46:47
            UPDATE