The Center for Education and Research in Information Assurance and Security (CERIAS)
The Center for Education and Research in
Information Assurance and Security (CERIAS)
Menu
Search CERIAS
Go
HOME
(current)
ABOUT
About CERIAS
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
PEOPLE
Faculty & Research Staff
Student List
Staff
PhD Graduates
Awards
All People
PARTNERS
Strategic Partners
External Advisory Board
Donors
Purdue Campus Partners
All Partners
SEMINARS
NEWS & BLOGS
RESEARCH
EDUCATION
RESOURCES
STUDENTS
SYMPOSIUM
Search CERIAS
Go
Home
>
Reports and Papers Archive
>
Reports and Papers Archive
Search:
Type:
Type
article
book
booklet
collection
conference
inbook
incollection
inproceedings
manual
mastersthesis
misc
patent
phdthesis
proceedings
techreport
unpublished
Browse All Papers »
Submit A Paper »
‹ First
<
6
7
8
>
Last ›
Department of Defense Trusted Computer System Evaluation Criteria
National Computer Security Association
Added 2016-12-02
Personal Computer Security Considerations
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Trusted Facility Management
National Computer Security Association
Added 2016-12-02
Trusted Produce Evaluation Questionanaire
National Computer Security Association
Added 2016-12-02
Trusted Database Management System Interpretation
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Trusted Recovery in Trusted Systems
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Data Remanence
National Computer Security Association
Added 2016-12-02
A Guide to Writing the Security Features User's Guide
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems
National Computer Security Association
Added 2016-12-02
Advisory Memorandum on Office Automation Security Guideline
NTISS
Added 2016-12-02
Internet & Web Law 1996
William J. Cook
Added 2016-12-01
Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-
IEEE Computer Society
Added 2016-11-29
A Guide to Formulating Computer Operating and Security Policy for Users
Compupol
Added 2016-11-29
Distributed Intrusion Detection System (DIDS) User Manual
Trident Data Systems
Added 2016-11-29
Computing Research. Scholarship. Innovation.
ACM
Added 2016-11-29
‹ First
<
6
7
8
>
Last ›