enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Trusted Computer System Evaluation Criteria - Wikipedia

    en.wikipedia.org/wiki/Trusted_Computer_System...

    The US Department of Defense (DoD) Advanced Research Projects Agency (ARPA), now DARPA was a primary funder of research into time-sharing. [1] By 1970, DoD was planning a major procurement of mainframe computers referred to as the Worldwide Military Command and Control System (WWMCCS) to support military command operations. The desire to meet ...

  3. National Defense Authorization Act for Fiscal Year 2014

    en.wikipedia.org/wiki/National_Defense...

    The National Defense Authorization Act for Fiscal Year 2014 (H.R. 3304; NDAA 2014, Pub.L 113-66) is a United States federal law which specifies the budget and expenditures of the United States Department of Defense (DOD) for Fiscal Year 2014. The law authorizes the DOD to spend $607 billion in Fiscal Year 2014.

  4. Item Unique Identification - Wikipedia

    en.wikipedia.org/wiki/Item_Unique_Identification

    As per the memorandum issued by the Department of Defense (DoD), UID-marking is a must for all solicitations issued on or after Jan. 1, 2005. Also the US Department of Defense has made it mandatory for all federal contractors to have UID-marking on their government furnished military and non-military equipment by September 30, 2007.

  5. Cyber Security and Information Systems Information Analysis ...

    en.wikipedia.org/wiki/Cyber_Security_and...

    CSIAC collects IA/DIO related STI to share with the DoD, other federal agencies, their contractors, and the research and engineering (R&E) community. The STI program is governed by DoD Directive 3200.12, DoD STI Program. [19] CSIAC has thousands of IA/DIO-related documents in their technical repository. [20]

  6. Cross-domain solution - Wikipedia

    en.wikipedia.org/wiki/Cross-domain_solution

    A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software or hardware that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security policy.

  7. McCarran Internal Security Act - Wikipedia

    en.wikipedia.org/wiki/McCarran_Internal_Security_Act

    The ALARACT refers to AR 190-11 and public law (section 1062 of Public Law 111–383, also known as the National Defense Authorization Act for Fiscal Year 2011); AR 190–11 in turn cites the McCarran Internal Security Act (codified as 50 USC 797). The ALARACT reference is a truncated version of the public law. [27]

  8. Department of Defense police - Wikipedia

    en.wikipedia.org/wiki/Department_of_Defense_police

    As of the publication of DoD Instruction 5525.12 in 2014, [12] qualified DoD LEOs and personnel of the various military police agencies fall under the Law Enforcement Officers Safety Act, permitting them to carry a concealed firearm off-duty across the United States, regardless of most state and local laws, with some exceptions.

  9. Transgender personnel in the United States military - Wikipedia

    en.wikipedia.org/wiki/Transgender_personnel_in...

    The DoD report notes that DoDI 6130.03 provides "baseline accession medical standards" and touts that it "is reviewed every three to four years by the Accession Medical Standards Working Group" but later notes the "standards were consistent with DSM-III" (published in 1980) and that "[d]ue to challenges associated with updating and publishing a ...