Trusted computing

Results: 881



#Item
851Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
852Microcomputer PROLOG implementations: The state-of-the-art by HAL BERGHEL and RICHARD RANKIN

Microcomputer PROLOG implementations: The state-of-the-art by HAL BERGHEL and RICHARD RANKIN

Add to Reading List

Source URL: www.customer_service.trusted.secure.server.bestandmostsecureonlinebankinamerica.myfavoritebank.com.berghel.com

Language: English - Date: 2010-09-17 13:36:44
853CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
854

PDF Document

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2005-11-21 16:32:53
855

PDF Document

Add to Reading List

Source URL: www.vivekhaldar.com

Language: English - Date: 2005-12-09 20:49:49
856

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-03-01 13:52:16
857

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-01-24 12:08:23
858

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-08 17:47:54
859TNC IF-M

TNC IF-M

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-05-18 00:18:12
860

PDF Document

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-05 10:48:36