Trusted system

Results: 509



#Item
501IBM AIX / POWER6 / IBM System i / POWER7 / IBM POWER / Operating system / Trusted Platform Module / PowerVM / IBM System p / Computer architecture / IBM / Server hardware

PDF Document

Add to Reading List

Source URL: publib.boulder.ibm.com

Language: English
502Software / System software / BitLocker Drive Encryption / TrueCrypt / DiskCryptor / Trusted Platform Module / Cold boot attack / Filesystem-level encryption / USB flash drive / Disk encryption / Cryptography / Cryptographic software

PDF Document

Add to Reading List

Source URL: events.ccc.de

Language: English - Date: 2009-01-10 04:33:01
503Computer network security / Multilevel security / Mandatory access control / Ring / Trusted system / Operating system / Capability-based security / Kernel / Security policy / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: cs.unomaha.edu

Language: English - Date: 2004-09-02 16:22:23
504Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-02-19 00:00:00
505Computer network security / Crime prevention / National security / Multilevel security / Information security / Mandatory access control / Trusted Computer System Evaluation Criteria / Security token / Ring / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1998-10-28 00:00:00
506Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-06-03 01:00:00
507Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Trusted Computer System Evaluation Criteria / Penetration test / Validation / Evaluation / Computer security / National Information Assurance Partnership

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-26 01:00:00
508X86 architecture / Out-of-band management / Intel vPro / Intel Core / Intel Active Management Technology / Intel / Trusted Execution Technology / Hyper-threading / Multi-core processor / Computing / Computer hardware / System software

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2009-12-29 16:38:10
509Computer architecture / Preboot Execution Environment / Booting / Authorization certificate / Unified Extensible Firmware Interface / Trusted Platform Module / BIOS / Computing / System software

PDF Document

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2006-03-28 18:43:35
UPDATE