Security assurance

Results: 2582



#Item
451Computer network security / Trusted computing / Data transmission / IF-MAP / Attack / Vulnerability / Burglar alarm / Computer security / Security / Cyberwarfare

TNC-SCAP Use Cases Paul Bartock Vulnerability Analysis & Operations Group Information Assurance Directorate National Security Agency 24 March 2011

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:04
452Evaluation Assurance Level / ITSEC / Gemalto / Evaluation / Computer security / Common Criteria

Ways to CC evaluation cost reduction - beyond CC V3 7th ICCC – LanzaroteSeptember 2006 Speaker : Françoise Forge Security Management System- Evaluation schemes

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:30
453Computing / Evaluation / Host Based Security System / Security Technical Implementation Guide / Certification and Accreditation / Information assurance / EMASS / DOD Information Assurance Certification and Accreditation Program / Computer security / United States Department of Defense / Department of Defense Information Assurance Certification and Accreditation Process

Senior Network Security Officer (Security Specialist 3) Title: Location: Reports to:

Add to Reading List

Source URL: ealliant.com

Language: English - Date: 2012-09-17 01:03:21
454Nuclear proliferation / Nuclear Non-Proliferation Treaty / Disarmament / Nuclear disarmament / Weapon of mass destruction / Comprehensive Nuclear-Test-Ban Treaty / Security assurance / 13 steps / New Agenda Coalition / International relations / Nuclear weapons / Arms control

AUnited Nations General Assembly

Add to Reading List

Source URL: www.reachingcriticalwill.org

Language: English - Date: 2014-07-11 09:29:37
455Access control / Biometrics / Digital identity / Identity document / Authentication / Interactive kiosk / Identity assurance / Smart card / Identity theft / Security / Identity management / Identity

Microsoft Word - NextgenID_news_WV_homeland_071614

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2014-07-16 23:48:36
456War / Information operations / Electronic warfare / Hacking / Military technology / IWar / Information warfare / United States Military Academy / United States Air Force Academy / Military science / Colorado counties / Cyberwarfare

THE CYBER DEFENSE EXERCISE: AN EVALUATION OF THE EFFECTIVENESS OF INFORMATION ASSURANCE EDUCATION Wayne J. Schepens National Security Agency Information Technology Operations Center United States Military Academy

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
457Data privacy / Computing / Computer law / Data Protection Act / Barnardisation / Personally identifiable information / Information privacy / Internet privacy / Information security / Ethics / Privacy / Security

Information Assurance Policies and Guidance Policy and Guidance on Anonymising Personal Data for Secondary Uses February 2014

Add to Reading List

Source URL: www.leicester.gov.uk

Language: English - Date: 2015-03-26 12:10:35
458Merchant services / Payment systems / Credit card / Fee / Payment / Card security code / Business / Electronic commerce / Economics

HANDS-ON TRAINING COURSE on QUALITY ASSURANCE AND SAFETY IN MAGNETIC RESONANCE IMAGING 13 – 14 September 2014, Athens, Greece Please fill out this form and send it by fax (+or email (efomp2014@prctravel

Add to Reading List

Source URL: www.efomp-2014.gr

Language: English - Date: 2014-05-27 04:17:45
459Unix / Malware / File system / Operating system / Computer file / Device file / Privilege / Configuration file / Setuid / Computing / System software / Computer security

Proceedings of the 2003 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY June 2001 Detecting Insider Threats by Monitoring System Call Activity Nam Nguyen and Peter Reiher

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2003-08-18 18:46:28
460Preimage attack / SHA-2 / Hash function / SHA-1 / MD5 / Collision resistance / Collision / Crypt / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Dynamic Cryptographic Hash Functions William R. Speirs II and Samuel S. Wagstaff, Jr. Center for Education and Research in Information Assurance and Security (CERIAS) Department of Computer Sciences, Purdue University A

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-05-21 19:29:06
UPDATE