Trusted Information Systems

Results: 75



#Item
11IJIS: 3–13 / Digital Object Identifier (DOIs102070100003  Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
12A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory  Military systems that process classified information must operate in a secure manner; tha

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
13Trusted Information Systems Internet Firewall Toolkit An Overview 1 ©Copyright Trusted Information Systems 1993, All rights reserved

Trusted Information Systems Internet Firewall Toolkit An Overview 1 ©Copyright Trusted Information Systems 1993, All rights reserved

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:18
14Public Accounting System We understand that an accounting system is really all about: Better Decision Making As a trusted advisor, you must be able to provide your clients with the information that may be important to ma

Public Accounting System We understand that an accounting system is really all about: Better Decision Making As a trusted advisor, you must be able to provide your clients with the information that may be important to ma

Add to Reading List

Source URL: www.intersoftsystems.com

Language: English - Date: 2015-04-15 18:55:49
15Crime prevention / National security / Data security / United States Agency for International Development / Information security / Trusted Computer System Evaluation Criteria / Vulnerability / Password / Access control / Security / Computer security / Public safety

Last RevisedFunctional SeriesManagement Services ChapterInformation Systems Security Table of Contents

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
16Network Working Group Request for Comments: 1396 S. Crocker Trusted Information Systems, Inc. January 1993

Network Working Group Request for Comments: 1396 S. Crocker Trusted Information Systems, Inc. January 1993

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:56
172nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

2nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-04-01 03:12:26
18IBM Software  Delivering trusted information for the modern data warehouse Make information integration and governance a best practice in the big data era

IBM Software Delivering trusted information for the modern data warehouse Make information integration and governance a best practice in the big data era

Add to Reading List

Source URL: www.dotgroup.co.uk

Language: English - Date: 2014-11-25 16:29:49
19With over 20 years’ experience in CRM and other data quality projects, DQ Global developed Match™ so you can trust your Customer and Contact data assets. Trusted by over 500 organisations worldwide, Match™ ensures

With over 20 years’ experience in CRM and other data quality projects, DQ Global developed Match™ so you can trust your Customer and Contact data assets. Trusted by over 500 organisations worldwide, Match™ ensures

Add to Reading List

Source URL: www.dqglobal.com

Language: English - Date: 2014-01-31 04:36:09
20

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00