XTS-400

Results: 51



#Item
31ISO standards / Computer network security / Common Criteria / Crime prevention / National security / Public safety / XTS-400 / Security / Evaluation / Computer security

Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2007

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:14:53
32ISO standards / Computer network security / Common Criteria / Crime prevention / National security / Public safety / XTS-400 / Security / Evaluation / Computer security

Common Criteria for Information Technology Security Evaluation Part 2: Security functional components September 2006

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:14:51
33Trusted computing base / Trustworthy computing / Trusted Computing / Trusted system / Ring / Operating system / Vulnerability / Multilevel security / XTS-400 / Computer security / Security / Cyberwarfare

/tardir/tiffs/a408641.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:12:11
34Computer network security / Trusted computing base / Operating system / Server / Trusted Computing / Kernel / Ring / XTS-400 / Security-Enhanced Linux / Computer security / Computer architecture / Security

/tardir/tiffs/a408173.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:23:12
35Crime prevention / National security / Evaluation / XTS-400 / Mandatory access control / Multilevel security / Multiple Independent Levels of Security / Separation kernel / Linux kernel / Computer security / Security / Computing

Microsoft Word - DISTPG.doc

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-09-28 10:43:57
36Computer programming / Object / Constructor / Evaluation / XTS-400 / Software engineering / Object-oriented programming / Computing

xts: Extensible Time Series Jeffrey A. Ryan Joshua M. Ulrich May 18, 2008

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 16:51:57
37Computer network security / Trusted path / Two-factor authentication / Operating system / One-time password / Password / Access control / XTS-400 / Rootkit / Security / Computer security / Identity management

PDF Document

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2008-12-03 09:21:20
38National security / Evaluation / Trusted computing base / Trusted system / Operating system / Protection mechanism / Multilevel security / XTS-400 / Computer security / Security / Crime prevention

Proposed Technical Evaluation for Trusted Computer Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 15:50:40
39ISO standards / Computer network security / Common Criteria / Crime prevention / National security / XTS-400 / Evaluation / Security / Computer security

Common Criteria for Information Technology Security Evaluation Part 2: Security functional components July 2009

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:14:54
40Computer network security / Crime prevention / National security / Computer security / XTS-400 / Security / Evaluation / Common Criteria

Common Criteria for Information Technology Security Evaluation Part 2: Security functional requirements August 2005

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:05
UPDATE