Security assurance

Results: 2582



#Item
671Protection Profile / Evaluation Assurance Level / Computing / Ethernet / Security Target / Computer peripherals / Network switch / Personal computer hardware / KVM switch / Evaluation / Computer hardware / Common Criteria

Microsoft Word[removed]SERTIT-051CR v10 Thinklogical VX 640

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-11-29 04:17:07
672Audit / Information technology audit / Computer security / Auditing / Ethics / Thought / Information technology audit process / Evaluation / Common Criteria / National Information Assurance Partnership

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® T

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2010-01-22 15:00:38
673Cryptography / National Information Assurance Partnership / Cryptography standards / Computing / FIPS 140-2 / Common Criteria Testing Laboratory / Evaluation / Common Criteria / Computer security

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2010-01-22 15:00:38
674Protection Profile / Evaluation Assurance Level / Requirement / Thought / Knowledge / Action / Evaluation / Common Criteria / Security Target

® Common Criteria Evaluation and Validation Scheme Transition Guide Summary of changes in the CC/CEM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
675Computing / Standards / CESG Listed Advisor Scheme / Skills Framework for the Information Age / Penetration test / Professional certification / Information assurance / Information security / Information security professionalism / Information Risk Management / Computer security / Security

Guidance to CESG Certification for IA Professionals Issue 2.1 January

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2015-01-06 00:20:22
676Computer security / Common Criteria Evaluation and Validation Scheme / Computing / Common Criteria / Protection Profile / Knowledge / Entropy / Validator / STING / Evaluation / National Information Assurance Partnership / Common Criteria Testing Laboratory

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® ™

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2013-11-27 07:17:02
677Security seal / Access control / Seal / United States Navy SEALs / Pinniped / Packaging / Security / Identification

MAF Food Assurance Authority Manual 15: Approvals Brands-Inspection Legend Material-Container Seals 5

Add to Reading List

Source URL: www.foodsafety.govt.nz

Language: English - Date: 2011-04-19 19:04:34
678Anticipatory thinking / Software quality / Source code / Boost / Software development / Application security / Software development process / Software security assurance / Computing / Software / Computer programming

BOOST your code quality and efficiency Is your application development

Add to Reading List

Source URL: www.softability.fi

Language: English - Date: 1979-12-31 19:00:00
679Nuclear proliferation / Nuclear weapons / Fissile Material Cut-off Treaty / Nuclear warfare / Conference on Disarmament / Nuclear disarmament / Disarmament / Security assurance / Comprehensive Nuclear-Test-Ban Treaty / International relations / Arms control / International security

KMBT_C364e[removed]

Add to Reading List

Source URL: www.reachingcriticalwill.org

Language: English - Date: 2015-02-26 11:32:00
680Computer security / Azure Services Platform / Trustworthy computing / Microsoft Dynamics CRM / Microsoft / Microsoft Online Services / IICCRD / Cloud computing / Computing / Centralized computing

The Microsoft approach to cloud transparency Using the Cloud Security Alliance’s Security, Trust & Assurance Registry (STAR) www.microsoft.com/twcnext

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-06-04 15:51:25
UPDATE