System integrity

Results: 1213



#Item
281Security / Cyberwarfare / Evaluation Assurance Level / Common Criteria / Security Target / Protection Profile / AirMagnet / Integrity / Threat / Computer security / Evaluation / Computer network security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-011 CR Certification Report Issue[removed]December[removed]AirMagnet Enterprise System 8.5

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:39
282Input/output Buffer Information Specification / Signal integrity / Ibis / SPICE / Integrated circuit design / Ambient intelligence / Systems design / Electronic engineering / Electronic design automation / Design

Consulting Services Experts in Signal Integrity, Timing, Crosstalk and Power Integrity System Level Signal Integrity • Package Design Design Kits • IBIS/IBIS-AMI Modeling

Add to Reading List

Source URL: www.sisoft.com

Language: English - Date: 2015-01-26 14:46:19
283Prevention / TÜV Rheinland / Technischer Überwachungsverein / Functional Safety / Safety Integrity Level / IEC 61511 / Safety instrumented system / Safety / Risk / Security

Functional Safety Brochure long version Approved.pub

Add to Reading List

Source URL: www.iica.org.au

Language: English - Date: 2014-12-10 18:50:09
284Banking / Finance / Electronic commerce / Cheque / Numismatics / Payment / Debit card / Bank / Payment systems / Business / Economics

Post Payment System (PPS) Payment Integrity’s Next Generation Lisa M. Andre, AAP Philadelphia Financial Center September 18, 2014

Add to Reading List

Source URL: www.fiscal.treasury.gov

Language: English - Date: 2015-01-30 08:29:12
285Security / CCSDS / Authentication / HMAC / Measurement / Science / Message authentication codes / Committees / Consultative Committee for Space Data Systems

Report Concerning Space Data System Standards AUTHENTICATION/INTEGRITY ALGORITHM ISSUES SURVEY INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2008-04-01 13:44:37
286Federal Reserve System / Database / Access control / Health Insurance Portability and Accountability Act / Information security / Security / Computer security / Internet privacy

The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal government throu

Add to Reading List

Source URL: fiscal.treasury.gov

Language: English - Date: 2015-02-25 08:43:31
287Virtual machines / HP-UX / System V / Virtualization / Converged infrastructure / HP Integrity Servers / Hardware virtualization / Hypervisor / System software / Software / Computing

Brochure Optimize Critical Workloads HP Virtualization Continuum for HP-UX

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
288Internet privacy / Information technology controls / Privacy / Information security audit / Information security / Ethics / Accountability / Freedom of information legislation

The Bureau of the Fiscal Service Privacy Impact Assessment Personnel Action Workflow System (PAWS) The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational ef

Add to Reading List

Source URL: www.publicdebt.treas.gov

Language: English - Date: 2015-02-25 09:14:19
289Federal Reserve System / Database / Access control / Health Insurance Portability and Accountability Act / Information security / Security / Computer security / Internet privacy

The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal government throu

Add to Reading List

Source URL: www.publicdebt.treas.gov

Language: English - Date: 2015-02-25 08:43:31
290Computer security / Windows Vista / Windows XP / Privilege / Principle of least privilege / Superuser / Windows Installer / Mandatory Integrity Control / Group Policy / Microsoft Windows / System software / Software

BeyondTrust® Privilege Manager BeyondTrust empowers IT to eliminate the risk of intentional, accidental and indirect “Once inside a company’s environment, access to various areas should be restricted based on busine

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2010-09-08 23:23:55
UPDATE