1![Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh) Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)](https://www.pdfsearch.io/img/39dde10529219ff9a9859e30a924dcce.jpg) | Add to Reading ListSource URL: www.avolio.comLanguage: English - Date: 2010-05-14 09:24:10
|
---|
2![Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract](https://www.pdfsearch.io/img/732bb8f21c3cffe65c33c8fdf2fe1fc1.jpg) | Add to Reading ListSource URL: www.avolio.comLanguage: English - Date: 2007-12-29 17:42:39
|
---|
3![Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli](https://www.pdfsearch.io/img/50d9aa3c943846736c1dfc85c79369f6.jpg) | Add to Reading ListSource URL: www.cisr.usLanguage: English - Date: 2007-11-15 12:21:56
|
---|
4![Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir](https://www.pdfsearch.io/img/5b97598e759d83513c0ef6d1eee56b47.jpg) | Add to Reading ListSource URL: www.cisr.usLanguage: English - Date: 2007-11-15 12:21:11
|
---|
5![Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir](https://www.pdfsearch.io/img/e0a18a33c328dc6dee54223403d4f3f3.jpg) | Add to Reading ListSource URL: www.cisr.usLanguage: English - Date: 2007-11-15 12:21:11
|
---|
6![Towards Trusted Systems from the Ground Up Vivek Haldar Michael Franz Information and Computer Science, Towards Trusted Systems from the Ground Up Vivek Haldar Michael Franz Information and Computer Science,](https://www.pdfsearch.io/img/37d3fab07e196e8b5dece223c1caffcc.jpg) | Add to Reading ListSource URL: www.vivekhaldar.comLanguage: English - Date: 2005-12-09 20:49:47
|
---|
7![TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337 TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337](https://www.pdfsearch.io/img/0faae60e95a23f7484af4944edf4d139.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:00:26
|
---|
8![MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage](https://www.pdfsearch.io/img/78e416bef6453ae17d29f9b14224c5ef.jpg) | Add to Reading ListSource URL: www.elucitsoftware.comLanguage: English - Date: 2012-03-09 23:37:04
|
---|
9![To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr](https://www.pdfsearch.io/img/b417357cca9b0203f413e669765fd9b4.jpg) | Add to Reading ListSource URL: www.landwehr.orgLanguage: English - Date: 2014-08-18 19:31:33
|
---|
10![Build and Operate a Trusted GIG Build and Operate a Trusted GIG](https://www.pdfsearch.io/img/d23ccee87174e090f892218ae3e879c7.jpg) | Add to Reading ListSource URL: iac.dtic.milLanguage: English - Date: 2015-04-27 13:16:03
|
---|