Trefwoordtrusted systems
Werken met dit trefwoord
Meest gemerkt | Gewogen | Recent populair | Recent gepubliceerd — Filter: Geen (bewerk)
- A Guide To Understanding Covert Channel Analysis of Trusted Systems door National Computer Security Center (1 keer)
- NCSC-TG-029 : Introduction to Certification and Accreditation Concepts door National Computer Security Center (1 keer)
- Assessing Controlled Access Protection. NCSC-TG-028, Version-1 door National Computer Security Center (1 keer)
- Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems door National Computer Security Center (1 keer)
- Guide to Writing the Security Features User's Guide for Trusted Systems door National Computer Security Center (1 keer)
- NCSC-TG-025 : Guide to Understanding Data Remanence in Automated Information Systems door National Computer Security Center (1 keer)
- NCSC-TG-024 Vol. 3/4 : Procurement of Trusted Systems: Computer Security Contract Data Requirements List and Data Item Description door National Computer Security Center (1 keer)
- NCSC-TG-024 Vol. 2/4 : Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work door National Computer Security Center (1 keer)
- NCSC-TG-024 Vol. 1/4 : Procurement of Trusted Systems: An Introduction to Procurement Initiators on Computer Security Requirements door National Computer Security Center (1 keer)
- A Guide to Understanding Security Testing and Test Documentation in Trusted Systems, Version 1 door National Computer Security Center (1 keer)
- Guide to Understanding Trusted Recovery in Trusted Systems by Gligor, Virgil D. (1991) Paperback door National Computer Security Center (1 keer)
- NCSC-TG-021 : Trusted Database Management System Interpretation of the TCSEC door National Computer Security Center (1 keer)
- Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System door National Computer Security Center (1 keer)
- NCSC-TG-002 : Trusted Product Evaluation - A Guide for Vendors door National Computer Security Center (1 keer)
- Guide to Understanding Object Reuse in Trusted Systems door National Computer Security Center (1 keer)
- Guidelines for Writing Trusted Facility Manuals. NCSC-TG-016, Version-1 door National Computer Security Center (1 keer)
- A Guide to Understanding Trusted Facility Management. NCSC-TG-015, Version-1 door National Computer Security Center (1 keer)
- Guidelines for Formal Verification Systems. NCSC-TG-014, Version-1 door National Computer Security Center (1 keer)
- Rating Maintenance Phase Program Document door National Computer Security Center (1 keer)
- NCSC-TG-013 : Rating Maintenance Phase Program Document door National Computer Security Center (1 keer)
- Trusted network interpretation environments guideline: Guidance for applying the trusted network interpretation door National Computer Security Center (1 keer)
- A Guide to Understanding Security Modeling in Trusted Systems door National Computer Security Center (1 keer)
- NCSC-TG-009 : Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria door National Computer Security Center (1 keer)
- Guide to Understanding Trusted Distribution in Trusted Systems door National Computer Security Center (1 keer)
- Guide to Understanding Design Documentation in Trusted Systems door National Computer Security Center (1 keer)
Gebruik van het trefwoord
Cyber.Neophyte (36), drwho (18)Recentelijk van dit trefwoord voorzien
Google Books Ngram Viewer
Data van Google's Boeken Ngram Kijker