Security assurance

Results: 2582



#Item
431Cyberwarfare / Computer network security / Security / Penetration test / Risk assessment / Vulnerability / Hacker / Software testing / Computer security / Risk

Case Study: Hospital External Security Assurance (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:37
432Security / Common Criteria / Security Target / Protection Profile / FIPS 140-2 / Evaluation Assurance Level / FIPS 140 / Validation / Systems engineering process / Computer security / Evaluation / Cryptography standards

ICCC7 Product Vendors Guide to Planning for Government Required Validations September 19, 2006

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:33
433Security Target / Professional certification / Public key certificate / Knowledge / Ethics / Thought / Evaluation / Standards / Evaluation Assurance Level

Developer Site Certification Trial-Use Results of the Site Certification Process Thomas Borsch

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 11:59:09
434Security Target / ISCI / Penetration test / Smart card / Knowledge / Computing / Action / Evaluation / ISO standards / Evaluation Assurance Level

ISCI - International Security Certification Initiative Updating supporting documents for composite product evaluation for CC V3 7th ICCC Lanzarote – 19-21 September 2006

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:46
435Common Criteria / Evaluation Assurance Level / ITSEC / Penetration test / Accreditation / Copyright / CESG Claims Tested Mark / Evaluation / Computer security / Thought

Common Criteria Certification in the UK 7th ICCC – Lanzarote – September 2006 Nigel Jones Head of Assurance Services CESG, UK

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:45
436Computer network security / Crime prevention / National security / Data security / Vulnerability / McAfee / Information assurance / Information technology specialist / Information security professionalism / Computer security / Security / Cyberwarfare

Junior Network Security Officer (Security Specialist 1) Title: Location: Reports to:

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-09-17 01:03:22
437Evaluation / Actuarial science / Risk analysis / Evaluation Assurance Level / Risk management / Vulnerability / Computer security / Systems engineering process / IT risk management / Risk / Ethics / Security

Build a CC assurance package dedicated to your risk assessment Francois GUERIN Security Program Manager

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:30
438Cyberwarfare / Software testing / Computer network security / Quality assurance / Software assurance / Computer security / Vulnerability / Open-source software / Debian / Security / Software quality / Software

Microsoft Word - Data Sheet V1 KH.docx

Add to Reading List

Source URL: continuousassurance.org

Language: English - Date: 2014-05-30 16:52:50
439Threat model / Two-factor authentication / Payment Card Industry Data Security Standard / Data center / Software development process / Security Technical Implementation Guide / Department of Defense Information Assurance Certification and Accreditation Process / Computer security / Computing / Information technology management

Security Datasheet Ensure Security Without Compromise with Nutanix Defense in Depth Strategy Security Development Lifecycle The Nutanix Security Development Lifecycle (SecDL) incorporates security into every

Add to Reading List

Source URL: go.nutanix.com

Language: English - Date: 2015-04-26 02:19:47
440Nuclear warfare / Weapons of mass destruction / Arms control / Nuclear Non-Proliferation Treaty / No first use / Nuclear disarmament / NPT Review Conference / Nuclear Posture Review / Security assurance / International relations / Nuclear weapons / Nuclear proliferation

Viewpoint No First Use of Nuclear Weapons HAROLD A. FEIVESON AND ERNST JAN HOGENDOORN

Add to Reading List

Source URL: cns.miis.edu

Language: English - Date: 2010-01-27 18:45:04
UPDATE