tr

Secure Computing Techniques

Secure Computing Techniques

Research to understand secure operational procedures and secure segregation of information, including infosec and vulnerabilities at all levels of communications and information systems, and understanding the nature of IW, high integrity software, open systems integration, architectures and standards. Research to ensure compliance with international standards.

Defense Industry Terminology