Vector Security

Results: 220



#Item
131FIPS 140 / Block cipher modes of operation / Initialization vector / Advanced Encryption Standard / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word - JN 871 01b - Relm Security Policy Level 1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-06-23 01:00:00
132FIPS 140-2 / FIPS 140 / Block cipher modes of operation / Data Encryption Standard / Initialization vector / Zeroisation / Message authentication code / Communications security / Key Wrap / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 02f - KVL_4000_PIKE_Security_Policy_Level_2.08.2010_IGL changes.MOT_Accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
133FIPS 140 / Block cipher modes of operation / Initialization vector / Advanced Encryption Standard / Public-key cryptography / Cryptography / Cryptography standards / FIPS 140-2

Microsoft Word[removed]Relm Security Policy Level 1 - version 1.4.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-24 00:00:00
134Validity / Security / Biometrics / Electronic signature / Digital signature / Verification / Validation / Signature / Softpro / Cryptography / Systems engineering / Pharmaceutical industry

On-line Handwritten Signature Verification A White Paper from Vector Intelligence, Inc.: January, 2002 History The core of BioSig™, the On-line Handwritten Signature Verification system marketed by Vector Intelligence,

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-12 15:27:01
135Financial services / Contract / First Amendment to the United States Constitution / United States Constitution / Pension / Employee Retirement Income Security Act / United Kingdom labour law / Law / Contract law / Private law

Reason logo VECTOR B&W v2

Add to Reading List

Source URL: reason.org

Language: English - Date: 2014-07-10 15:39:04
136Computer security / Social vulnerability / Vulnerability assessment / Vulnerability / Threat / Asset / Current sea level rise / Adaptation to global warming / IT risk management / Risk / Security / Management

SFBayBanner_Vector_outline

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-01-08 22:20:31
137Validity / Security / Biometrics / Electronic signature / Digital signature / Verification / Validation / Signature / Softpro / Cryptography / Systems engineering / Pharmaceutical industry

On-line Handwritten Signature Verification A White Paper from Vector Intelligence, Inc.: January, 2002 History The core of BioSig™, the On-line Handwritten Signature Verification system marketed by Vector Intelligence,

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-08 09:45:57
138Psychological resilience / Social vulnerability / Evaluation / Vulnerability / Computer security / Cyberwarfare / Security / Risk / Motivation / Positive psychology

SFBayBanner_Vector_outline

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-11-07 23:31:39
139Network architecture / Verisign / Load balancing / Content delivery network / Domain Name System Security Extensions / Root name server / Denial-of-service attack / Domain name / DNS root zone / Computing / Domain name system / Internet

VRSN_logo_vertical_CMYK_vector

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-03-27 16:55:04
140Security / Biometrics / Identification / Surveillance / Electronic signature / Title 21 CFR Part 11 / Validation / X Window System / Food and Drug Administration / Pharmaceutical industry / Pharmaceutical sciences / Software

Memo of Meeting; Vector Intelligence[removed]

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2002-08-08 09:45:54
UPDATE