The Center for Education and Research in Information Assurance and Security (CERIAS)
The Center for Education and Research in
Information Assurance and Security (CERIAS)
Menu
Search CERIAS
Go
HOME
(current)
ABOUT
About CERIAS
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
PEOPLE
Faculty & Research Staff
Student List
Staff
PhD Graduates
Awards
All People
PARTNERS
Strategic Partners
External Advisory Board
Donors
Purdue Campus Partners
All Partners
SEMINARS
NEWS & BLOGS
RESEARCH
EDUCATION
RESOURCES
STUDENTS
SYMPOSIUM
Search CERIAS
Go
Home
>
Reports and Papers Archive
>
Reports and Papers Archive
Search:
Type:
Type
article
book
booklet
collection
conference
inbook
incollection
inproceedings
manual
mastersthesis
misc
patent
phdthesis
proceedings
techreport
unpublished
Browse All Papers »
Submit A Paper »
‹ First
<
4
5
6
7
8
>
Last ›
Assurance Strategies and Solutions
InfowarCon
Added 2016-12-09
Information Assurance and Information Operations for the Enterprise and Critical Infrastructure
InfowarCon
Added 2016-12-09
Interviews and Investigations: Human Factors and Cyber-Crime
InfowarCon
Added 2016-12-09
Hacking 101: Tools and Techniques
InfowarCon
Added 2016-12-09
Integrity in Automated Information Systems
National Computer Security Association
Added 2016-12-02
Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
National Computer Security Association
Added 2016-12-02
Department of Defense Trusted Computer System Evaluation Criteria
National Computer Security Association
Added 2016-12-02
Personal Computer Security Considerations
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Trusted Facility Management
National Computer Security Association
Added 2016-12-02
Trusted Produce Evaluation Questionanaire
National Computer Security Association
Added 2016-12-02
Trusted Database Management System Interpretation
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Trusted Recovery in Trusted Systems
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Data Remanence
National Computer Security Association
Added 2016-12-02
A Guide to Writing the Security Features User's Guide
National Computer Security Association
Added 2016-12-02
A Guide to Understanding Information System Security Officer Responsibilities for Automated Information Systems
National Computer Security Association
Added 2016-12-02
‹ First
<
4
5
6
7
8
>
Last ›