Create an Account
username: password:
 
  MemeStreams Logo

NSA - Security Configuration Guides

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
NSA - Security Configuration Guides
Topic: Technology 11:40 am EST, Nov  6, 2004

] NSA initiatives in enhancing software security cover both
] proprietary and open source software, and we have
] successfully used both proprietary and open source models
] in our research activities. NSA's work to enhance the
] security of software is motivated by one simple
] consideration: use our resources as efficiently as
] possible to give NSA's customers the best possible
] security options in the most widely employed products.
] The objective of the NSA research program is to develop
] technologic advances that can be shared with the software
] development community through a variety of transfer
] mechanisms. NSA does not favor or promote any specific
] software product or business model. Rather, NSA is
] promoting enhanced security.

NSA's guides to securing machines

NSA - Security Configuration Guides



 
 
Powered By Industrial Memetics
RSS2.0