Security assurance

Results: 2582



#Item
181Information security / Public safety / National security / Computer security / Security / Information assurance

DoD IASP SFS RFP - AY

Add to Reading List

Source URL: www.sait.fsu.edu

Language: English - Date: 2013-01-29 12:16:35
182Common Criteria / Security Target / Evaluation Assurance Level / Protection Profile / Evaluation / Computer security / Security

Microsoft Word - CC Part 3 with change marks

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-09-12 11:45:28
183Assurance services / Computer security / Information Risk Management / Information assurance

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: perceptivesoftware.com

Language: English - Date: 2015-06-18 03:54:37
184Public safety / Information security / Federal Information Security Management Act / Information assurance / Threat / Computer security / Security / Cyberwarfare

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-06-18 04:04:50
185Penetration test / Software testing / Surveillance / National Security Agency / Global Information Assurance Certification / Integrator / Software development process / Computer security / Computing / Computer network security

Criteria for CSfC Integrators 5 May 2014

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-09-12 11:51:25
186Assurance services / Computer security / Information Risk Management / Information assurance

Interim_LEX_Primary_Logo_Large_NEW-CMYK

Add to Reading List

Source URL: www.perceptivesoftware.com

Language: English - Date: 2015-06-18 03:54:37
187Security / Software testing / Hacking / Vulnerability / Software quality / Zero-day attack / Software assurance / Software bug / Patch / Computer network security / Cyberwarfare / Computer security

문서의 제목 나눔고딕B, 54pt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-09-12 12:11:16
188Arms control / International security / Middle Powers Initiative / Nuclear Non-Proliferation Treaty / NPT Review Conference / Nuclear disarmament / Security assurance / Global Security Institute / Jonathan Granoff / International relations / Nuclear proliferation / Nuclear weapons

This Middle Powers Initiative briefing paper was prepared by John Burroughs, executive director of the Lawyers’ Committee on Nu

Add to Reading List

Source URL: www.abolitionforum.org

Language: English - Date: 2011-08-24 06:48:25
189Evaluation / Red Hat Enterprise Linux / Common Criteria / Evaluation Assurance Level / Security Target / Linux kernel / Protection Profile / Linux / Red Hat / Computing / Computer security / Software

Microsoft Word - RedHat_security_target_eal4_v2-6.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
190Computer security / Crime prevention / National security / Information technology management / Vulnerability / Information security / Attack / Procurement / Multifunction printer / Security / Cyberwarfare / Computer network security

Vulnerability-centric assurance activities for MFP PP as a candidate for cPP Fumiaki Manabe JISEC / IPA, Japan

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-08-02 03:54:36
UPDATE