Trusted system

Results: 509



#Item
391ITSEC / Trusted Computer System Evaluation Criteria / Protection Profile / Security Target / Common Criteria / Trusted computing base / Vulnerability / Covert channel / Labeled Security Protection Profile / Computer security / Evaluation / CTCPEC

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:45:42
392CTCPEC / Protection Profile / Security Target / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / Labeled Security Protection Profile / Computer security / Evaluation / ITSEC

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:42:29
393Election fraud / Diebold / Gems / Voting machine / Disfranchisement / Government / Premier Election Solutions / Politics / Electronic voting / Information society

State of Maryland State Board of Elections Progress Report: Department of Legislative Services’ Trusted Agent Report on Diebold AccuVote-TS Voting System

Add to Reading List

Source URL: www.elections.state.md.us

Language: English - Date: 2014-05-20 17:14:52
394Immunology / Immune system / Allergy / Food intolerance / Trustee / Medicine / Health / Allergology

Quality Trustees from a Trusted Source CASE STUDY Allergy UK

Add to Reading List

Source URL: www.trustees-unlimited.co.uk

Language: English - Date: 2013-07-17 11:39:18
395Computer network security / Trusted path / Two-factor authentication / Operating system / One-time password / Password / Access control / XTS-400 / Rootkit / Security / Computer security / Identity management

PDF Document

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2008-12-03 09:21:20
396Malware / Rootkit / Xen / Joanna Rutkowska / Hypervisor / Blue Pill / Citrix Systems / Trusted Execution Technology / Hyper-V / System software / Software / Computer security

Introduction to Qubes OS bhyvecon Tokyo 2014 @ntddk Self-introduction

Add to Reading List

Source URL: bhyvecon.org

Language: English - Date: 2014-03-13 06:01:03
397Trusted Computer System Evaluation Criteria / Cloud computing / Common Criteria / Computer security / Computing / ITSEC

PDF Document

Add to Reading List

Source URL: events.oasis-open.org

Language: English - Date: 2011-10-12 09:39:32
398Federal Reserve Note / Mutilated currency / Federal Reserve System / United States dollar / Central bank / Government debt / Economy of North America / Money / Notes / Bureau of Engraving and Printing / Engraving

Mission The Bureau of Engraving and Printing develops and produces United States currency notes, trusted worldwide. Core Values Integrity • Fairness • Performance • Respect

Add to Reading List

Source URL: www.moneyfactory.com

Language: English - Date: 2014-08-18 12:31:18
399Federal Reserve Note / Mutilated currency / United States dollar / Federal Reserve System / Central bank / Government debt / Economy of North America / Money / Notes / Bureau of Engraving and Printing / Engraving

MISSION The Bureau of Engraving and Printing develops and produces United States currency notes, trusted worldwide. CORE VALUES Integrity • Fairness • Performance • Respect

Add to Reading List

Source URL: www.moneyfactory.com

Language: English - Date: 2014-08-18 12:31:18
400Land management / Cadastre / Boundary / Land Information New Zealand / Geography / Engineering / Real estate / Surveying / Geodesy

The cadastre: What’s important about boundary lines? A trusted system of property measurement This is the story of the invisible lines on the ground, the boundary lines we see on a plan of our properties – and why th

Add to Reading List

Source URL: www.linz.govt.nz

Language: English - Date: 2013-05-08 23:16:53
UPDATE