Trusted system

Results: 509



#Item
61WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS  How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-03-30 12:52:52
62A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:26
63NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:02
64Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
65seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
66MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

Add to Reading List

Source URL: www.elucitsoftware.com

Language: English - Date: 2012-03-09 23:37:04
67White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
68To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
69NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:00