Etiquetatrusted systems
Obras etiquetadas
Etiquetado más a menudo | Ponderado | Recientemente popular | Publicado recientemente — Filtrar: Ninguno (editar)
- A Guide To Understanding Covert Channel Analysis of Trusted Systems por National Computer Security Center (1 veces)
- NCSC-TG-029 : Introduction to Certification and Accreditation Concepts por National Computer Security Center (1 veces)
- Assessing Controlled Access Protection. NCSC-TG-028, Version-1 por National Computer Security Center (1 veces)
- Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems por National Computer Security Center (1 veces)
- Guide to Writing the Security Features User's Guide for Trusted Systems por National Computer Security Center (1 veces)
- NCSC-TG-025 : Guide to Understanding Data Remanence in Automated Information Systems por National Computer Security Center (1 veces)
- NCSC-TG-024 Vol. 3/4 : Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description por National Computer Security Center (1 veces)
- NCSC-TG-024 Vol. 2/4 : Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work por National Computer Security Center (1 veces)
- NCSC-TG-024 Vol. 1/4 : Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements por National Computer Security Center (1 veces)
- A Guide to Understanding Security Testing and Test Documentation in Trusted Systems, Version 1 por National Computer Security Center (1 veces)
- Guide to Understanding Trusted Recovery in Trusted Systems by Gligor, Virgil D. (1991) Paperback por National Computer Security Center (1 veces)
- NCSC-TG-021 : Trusted Database Management System Interpretation of the TCSEC por National Computer Security Center (1 veces)
- Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System por National Computer Security Center (1 veces)
- NCSC-TG-002 : Trusted Product Evaluation - A Guide for Vendors por National Computer Security Center (1 veces)
- Guide to Understanding Object Reuse in Trusted Systems por National Computer Security Center (1 veces)
- Guidelines for Writing Trusted Facility Manuals. NCSC-TG-016, Version-1 por National Computer Security Center (1 veces)
- A Guide to Understanding Trusted Facility Management. NCSC-TG-015, Version-1 por National Computer Security Center (1 veces)
- Guidelines for Formal Verification Systems. NCSC-TG-014, Version-1 por National Computer Security Center (1 veces)
- Rating Maintenance Phase Program Document por National Computer Security Center (1 veces)
- NCSC-TG-013 : Rating Maintenance Phase Program Document por National Computer Security Center (1 veces)
- Trusted network interpretation environments guideline: Guidance for applying the trusted network interpretation por National Computer Security Center (1 veces)
- A Guide to Understanding Security Modeling in Trusted Systems por National Computer Security Center (1 veces)
- NCSC-TG-009 : Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria por National Computer Security Center (1 veces)
- Guide to Understanding Trusted Distribution in Trusted Systems por National Computer Security Center (1 veces)
- Guide to Understanding Design Documentation in Trusted Systems por National Computer Security Center (1 veces)
Usan esta etiqueta
Cyber.Neophyte (36), drwho (18)Etiquetados recientemente
Google Books Ngram Viewer
Datos de Books Ngram Viewer