First Page | Document Content | |
---|---|---|
![]() Date: 2011-05-14 21:01:17National Security Agency Trusted Computer System Evaluation Criteria Secure communication United States Department of Defense Mandatory access control Defense Technical Information Center Trusted computing base Penetration test XTS-400 Computer security Computer network security Trusted computing | Source URL: www.dtic.milDownload Document from Source WebsiteFile Size: 3,90 MBShare Document on Facebook |
![]() | The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, GermanyDocID: 1r81S - View Document |
![]() | The Case for Abstracting Security PoliciesDocID: 1qQWS - View Document |
![]() | Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than QuantityDocID: 1quF6 - View Document |
![]() | æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>DocID: 1qs1H - View Document |
![]() | COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. SchellDocID: 1qlIH - View Document |