FIPS

Results: 2454



#Item
51Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:15:52
52Identity management / Computer access control / FIPS 201 / Standards / Presidential directive / Cryptography / Authentication / Credential / Interoperability / Computer security / Engineering

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
53Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-15 09:06:22
54Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
55Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
56Technology / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Joint Light Tactical Vehicle / FIPS 140-2 / Global Positioning System / Telematics

Microsoft Word - 4RidgeFinalSEPres_08092103_0920.docx

Add to Reading List

Source URL: www.ndia-mich.org

Language: English - Date: 2013-08-19 10:06:02
57Government / Terrorism / War on Terror / Organized crime / Prevention / Safety / Global Terrorism Database / Counter-terrorism / Definitions of terrorism / Homeland Security Centers of Excellence / Nuclear terrorism / United States Department of Homeland Security

National Consortium for the Study of Terrorism and Responses to Terrorism (START) A DHS Science and Technology Center of Excellence Mission: To advance science-based knowledge about the human causes

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-06 11:55:33
58

1 0 Федеральный институт промышленной собственности

Add to Reading List

Source URL: www.fips.ru

Language: Russian - Date: 2016-02-08 07:51:35
    59Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

    z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-19 10:01:42
    60Computer access control / Software / Computer security / Access control / FIPS 201 / PIV / Login / Single sign-on / Password / SharePoint

    PIV Login Quick Reference Guide   PIV Users can only login with Internet Explorer What is PIV and who uses it?

    Add to Reading List

    Source URL: floodmaps.fema.gov

    Language: English - Date: 2016-03-23 12:12:55
    UPDATE