Additional examples are adjusted to the entries in an automated way - we cannot guarantee that they are correct.
A security evaluation has been performed for the software.
"Hal was in charge of the security evaluation at the lllth," Patrick explained.
She was yesterday's news, useful only as a subject of gossip and the occasional damning security evaluation.
There have been no published reports of the cost of the various Microsoft Windows security evaluations.
"General Allegre asked me to wait on ImpSec's security evaluation.
Customers that deploy trusted operating systems typically require that the product complete a formal computer security evaluation.
Many police departments, including the New York Police Department, also offer free security evaluations of your property.
Five years later, in another security evaluation, Port Authority security officials said that 54 percent of the recommendations had been or were about to be implemented.
The detailed security evaluation was necessary, the 214-page report says, because government officials made mistakes in rushing to improve aviation security after the Sept. 11 attacks.
Infrastructure Assessments: The security evaluation of networks and systems to identify software and configuration vulnerabilities.
Security evaluation was once thought to be a problem for these free MLS implementations for three reasons:
A PP specifies generic security evaluation criteria to substantiate vendors' claims of a given family of information system products.
"Leased systems usually means getting a security evaluation for the leasing company's personnel as well, which we end up paying for and becoming responsible for maintaining."
This evaluation was performed under the Australian Information Security Evaluation Programme, and mutually recognised in a large number of nations.
Mrs. Lifland, 32, is a senior manager in operations for the securities evaluations department at Standard & Poor's in New York.
Officially titled the Trusted Computer Security Evaluation Criteria, it is popularly known as the Orange Book.
In a measure of how poor the F.A.A.'s security evaluations were in 1993, the report notes that this time, the agents found security problems in some cases.
One set of color overlays gave a security evaluation, with categories ranging from unconquered to pacified (though depressingly little of the planet showed that placid pink tone).
"These four vendors can confidently say that their systems have gone through the most robust and publicly disclosed security evaluation in the history of voting machines," Mr. Blackwell said.
The DOD formed the Computer Security Initiative and then the Computer Security Evaluation Center.
Security evaluation of NESSIE first phase (PDF)
This was due to increased concerns from the South African players, who were ready to pull out, but were willing to continue playing if Security Evaluations deemed it safe.
The UK IT security evaluation and certification scheme provides more detail as to the internal architecture of the FeliCa card (RC-S860 ).
Security Evaluation for IT Products An introduction to the benefits and procedures of UK ITSEC certification.
The project was founded by Robert Watson with the goal of implementing concepts from the Common Criteria for Information Technology Security Evaluation and the Orange Book.