<--- Back to Details
First PageDocument Content
Data security / United States Department of Defense / Government / Military acquisition / Computer network security / Security controls / Defense Technical Information Center / Information security / Under Secretary of Defense for Acquisition /  Technology and Logistics / Computer security / Security / National security
Date: 2010-05-18 16:54:34
Data security
United States Department of Defense
Government
Military acquisition
Computer network security
Security controls
Defense Technical Information Center
Information security
Under Secretary of Defense for Acquisition
Technology and Logistics
Computer security
Security
National security

DoD[removed]R, [removed], Change 1, [removed]see DTM[removed], DTM[removed])

Add to Reading List

Source URL: www.dtic.mil

Download Document from Source Website

File Size: 135,67 KB

Share Document on Facebook

Similar Documents

   Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

DocID: 1vidI - View Document

Microsoft Word - CABForum_Network_Security_Controls.doc

DocID: 1uUnT - View Document

Thomson Reuters Service Organization Controls 3 SysTrust Report System Description of the Thomson Reuters Legal Tracker System Based in the United States Relevant to Security, Availability, Processing

DocID: 1uQLo - View Document

D ATA S H E E T Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

DocID: 1utCb - View Document

Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

DocID: 1udM0 - View Document