MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
CobitItsecBiba modelCommon criteriaNist cybersecurity frameworkInformation security managementMceliece cryptosystemRelational modelHalstead complexity measuresCodd's cellular automatonRisk management frameworkFletcher's checksumIt baseline protectionCapability maturity modelSecurity engineeringHipo modelCapability-based securityJackson structured programmingSha-2Tuple relational calculusIso/iec 27001 lead auditorInformation technology auditHmg infosec standard no.1Security testingEinsteinIso/iec 27002Take-grant protection modelBcryptAccess control matrixNist enterprise architecture modelRsa factoring challengeFips 199Information assuranceData center securityMelvin conwayComputational trustGeneral problem solverIt security standardsNsa suite b cryptographySmart information retrieval systemIbm information management systemInformation securityOssimItilChief information security officerFips 140-3BlowfishComputer securityObject constraint languageRainbow seriesMacguffinIso/iec 9126Lattice-based access controlAdvanced encryption standardComputroniumFips 140-2Threat modelOutline of computer scienceAtt&ckData modelingComputer security softwareNational vulnerability databaseHardware security moduleIso/iec 38500Digital signature algorithmThe multiprogramming systemBrewer and nash modelParkerian hexadFrostburgInformation engineeringSoftware-defined perimeterQed manifestoCheney's algorithmSystems development life cycleFedrampInotifyInformation technology managementData integrity fieldComputer access controlFips 201Computer architectureSteane codeConfiguration managementIpo modelStrategic computing initiativeData architectureIntegrated architecture frameworkConvergenceAdler-32Data modelP3m3Flynn's taxonomyRsa securidCryptosystemInformation modelDigital signature standardModel-based systems engineeringCloud computing securityEnigma machineLinux security modules