Security type system

Results: 291



#Item
271Antivirus software / Malware / Design of experiments / Error / Spam filtering / Type I and type II errors / Computer virus / Spyware / Computer file / System software / Espionage / Software

Guidelines to False Positive Testing Preamble It is a very challenging problem to measure a security product’s false positive rate and to further characterize the impact of this false positive rate on both consumers an

Add to Reading List

Source URL: www.amtso.org

Language: English - Date: 2013-06-19 18:50:49
272Business law / Copyright law / Security / Trusted Platform Module / Trustworthy computing / Trusted Execution Technology / Security-Enhanced Linux / Mandatory access control / Type enforcement / Computer security / Trusted computing / Cryptography

The 9th International Conference for Young Computer Scientists Model–Driven Remote Attestation: Attesting Remote System from Behavioral Aspect Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Yanzhen Zou1 , Bing Xie1 , W

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:16:45
273Incident management / United States Department of Homeland Security / Disaster preparedness / Humanitarian aid / Incident Command System / National Incident Management System / Emergency service / Emergency / Incident Command Post / Public safety / Emergency management / Management

[Type text] University of Central Arkansas Police Department

Add to Reading List

Source URL: www.ucapd.com

Language: English - Date: 2012-11-13 10:33:52
274Anti-ballistic missiles / Military science / Joint Electronics Type Designation System / MIM-104 Patriot / Panavia Tornado / Radar / MIM-23 Hawk / Missile defense / Anti-aircraft warfare / Technology

MIT Security Studies Program

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
275Military communications / Key management / Military technology / COMSEC / Signal operating instructions / Joint Electronics Type Designation System / Cryptography / Communications security / Cyberwarfare

Army Key Management System (AKMS) Provides planners and operators with

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2005-09-22 13:54:03
276Joint Electronics Type Designation System / National Security Agency / National security / Electronic engineering / Security / Mass surveillance / Encodings / Equipment of the United States Air Force

NSA Recap of CRITIC Messages 010001Z-312400Z August 1964

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-04 21:28:33
277Access control / Security-Enhanced Linux / FLASK / Mandatory access control / Type enforcement / Multilevel security / Role-based access control / Security Identifier / Operating system / Computer security / Security / System software

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-12-29 17:06:34
278National security / Military communications / Security / Joint Electronics Type Designation System / SINCGARS / National Security Agency

ARC-210 Program Overview for the

Add to Reading List

Source URL: www.afceaboston.com

Language: English - Date: 2011-07-15 16:09:49
279National Security Agency / United States government secrecy / Joint Electronics Type Designation System / Security / Surveillance / Mass surveillance / National security

w. DOClD: [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-12-29 14:29:05
280National Security Agency / Security-Enhanced Linux / FLASK / Mandatory access control / Trusted Information Systems / Operating system / Linux / Type enforcement / Security-focused operating system / Computer security / Computing / System software

Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 15:26:04
UPDATE