10 Resultaten gevonden voor "Bestand:Trusted_Computer_System_Evaluation_Criteria_DOD_5200.28-STD.pdf".

Bestand:Trusted Computer System Evaluation Criteria DOD 5200.28-STD.pdf

DescriptionTrusted Computer System Evaluation Criteria DOD 5200.28-STD.pdf English: The Trusted Computer System Evaluation Criteria (TCSEC), also known...


Bestand:Trusted Computer System Evaluation Criteria CSC-STD-001-83.pdf

DescriptionTrusted Computer System Evaluation Criteria CSC-STD-001-83.pdf English: The Trusted Computer System Evaluation Criteria (TCSEC), also known...


Bestand:Computer Security Conference - A Report on the 10th National Computer Security Conference, Baltimore, Md, September 21-24, 1987 (IA jresv93n1p71).pdf

Computer Security Conference - A Report on the 10th National Computer Security Conference, Baltimore, Md, September 21-24, 1987   (  ) Author Isaac, I...


Bestand:Metric methodology for the creation of environments and processes to certify a component - specifically the Naval Research Laboratory Pump (IA metricmethodolog109451102).pdf

draft Type SSAA for Certification and Accreditation of the NP. Subjects: Computer security; United States Language English Publication date March 2003 Current...


Bestand:Risk assessment of LAN communications. (IA riskassessmentof00payl).pdf

Thesis advisor, William J. Haga AD-A257 327 Thesis (M.S. in Information Systems) Naval Postgraduate School, Sept. 1992 Bibliography: p. 70-71 Subjects:...


Bestand:The TMACH experiment phase 1 - preliminary development evaluation (IA tmachexperimentp5810flah).pdf

preliminary development evaluation   (  ) Author Flahavin, Ellen Colvin Title The TMACH experiment phase 1 - preliminary development evaluation Volume NISTIR 5810...


Bestand:Applying business process reengineering to the Marine Corps information assurance certification and accreditation process (IA applyingbusiness109454510).pdf

Source Internet Archive identifier: applyingbusiness109454510 https://archive.org/download/applyingbusiness109454510/applyingbusiness109454510.pdf...


Bestand:An analysis of automated solutions for the Certification and Accreditation of navy medicine information assets (IA annalysisofutoma109452039).pdf

https://archive.org/download/annalysisofutoma109452039/annalysisofutoma109452039.pdf Permission (Reusing this file) Approved for public release, distribution...


Bestand:Monitoring information systems to enforce computer security policies (IA monitoringinform00grah).pdf

information systems to enforce computer security policies   (  ) Author Graham, Scott W.;Mills, Stephen E. Title Monitoring information systems to enforce...


Bestand:A Trusted Path design and implementation for Security Enhanced Linux (IA atrustedpathdesi109459954).pdf

such mechanism is called a Trusted Path. A Trusted Path provides a protected communications channel that permits the computer to authenticate itself to...