Security assurance

Results: 2582



#Item
31Computer hardware / Computing / Computer data storage / Lenovo / Server hardware / ThinkServer / Solid-state drive / NVM Express / PCI Express / ThinkStation / IdeaPad

Lenovo System x3650 M5 World-class performance and industry-leading reliability Lenovo Trusted Platform Assurance, a built-in set of security features and practices, protects the hardware and firmware. Also deploy self-e

Add to Reading List

Source URL: www.lenovo.com

Language: English - Date: 2016-04-01 11:16:15
32Computer security / Computing / Security / Security Target / Common Criteria / Evaluation Assurance Level / Ohta / Protection Profile / Voice over IP

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: June-10 Previous editions:

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
33Computer security / Security / Prevention / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Crime prevention / Cryptography / National security / Certified Information Systems Security Professional / Risk management framework / Information assurance / Vulnerability

Technology Service Corporation an employee-owned company 1983 S. Liberty Drive, Bloomington, INPhone: (

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-08-31 15:51:13
34Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
35Computing / Computer architecture / Security / Cluster computing / Hewlett-Packard / OpenVMS / Parallel computing / Quality control / Protection ring / Computer security

Layered  Assurance  Scheme  for   Mul4-­‐Core  Architectures     J.  Alves-­‐Foss,  X.  He  and  J.  Song   Center  for  Secure  and  Dependable  Systems

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
36Computing / Security / Prevention / Data security / Crime prevention / Cryptography / Information governance / National security / Certified Information Systems Security Professional / CompTIA / Computer security / VMware ESXi

Senior Computer Network Administrator / Information System Security Officer (ISSO) Candidate Requirements: • Experience with Information Technology, Information Security and Information Assurance • Ability to work wi

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2016-08-02 13:19:19
37Computer security / Evaluation / Knowledge / Common Criteria / Evaluation Assurance Level / Security Target / Protection Profile / Product certification / Professional certification / Tests / Common Criteria Testing Laboratory

Microsoft Word - D06-Guidance to Applicants-Issue-03.docx

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
38Security / Access control / Computer security / Computer access control / Social information processing / Role-based access control / PERMIS / Web 2.0 / Social software / Attribute-Based Access Control

Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2012-06-04 07:35:14
39Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
40Computer security / Security / Cyberwarfare / Prevention / Vulnerability / Reliability engineering / Operations security / Systems engineering / Threat / Information assurance / Counterintelligence / Attack

System Security Engineering and Program Protection Integration into SE

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-11-06 08:35:31
UPDATE