exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files

ir5495.txt
Posted Aug 17, 1999

"Computer Security Training & Awareness Course Compendium", 1994

tags | paper
SHA-256 | a4b858e11173412d23a52dd7f265594113c10852430b16d710d1dcf1cc47abee
ir4749.txt
Posted Aug 17, 1999

"Sample Statements of Work for Federal Computer Security Services: For use In-House or Contracting Out", December 1991

tags | paper
SHA-256 | b0e14e2318cb592b85f7c8c8977232d0ab2866c9a1796cbc024453e7edc3882c
ir4939.txt
Posted Aug 17, 1999

"Threat Assessment of Malicious Code and External Attacks", October 1992

tags | paper
SHA-256 | e9a2c8c152d81cb7307c69371669795e2899908a8e44e516b6642b9b11896dcd
ir4976.txt
Posted Aug 17, 1999

"Assessing Federal and Commercial Information Security Needs", 1995

tags | paper
SHA-256 | e64f1336bb3555b3fce0a22cf7fffcd92063787dd9dc40508978b7a34846ad98
ir5153.txt
Posted Aug 17, 1999

"Minimum Security Requirements for Multi-User Operating Systems", March 1993

tags | paper
SHA-256 | d70b4cf5a22392bb13bf155039eff8e57a05e061eb9c572236ddd66a9e36a7e0
ir5308.txt
Posted Aug 17, 1999

"General Procedures for Registering Computer Security Objects", December 1993

tags | paper
SHA-256 | 5bb6ef6daddb31f31cb74ad9bf1bc6c886a2ad42c881849f7b9fe097a65fa850
ir5472.txt
Posted Aug 17, 1999

"A Head Start on Assurance Proceedings of an Invitational Workshop on Information Technology (IT) Assurance and Trustworthiness", August 1994

tags | paper
SHA-256 | 387af56b95ca7dc040d9760143fff770384c8303efb247a291d6e3b4d6105ab3
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close