Information in this document is subject to change without notice and does not represent a commitment on the part of Information Security Corporation. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the agreement. No part of this manual may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose other than the purchaser’s personal use without the prior written permission of Information Security Corporation.
The ISC CDK software is commercial computer software and, together with any related documentation, is subject to the restrictions on U.S. Government use as set forth below.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software Clause at DFARS 52.227-7013. “Contractor/manufacturer” is Information Security Corporation, 1011 Lake Street, Suite 425, Oak Park, IL 60301.
The U.S. International Traffic in Arms Regulations (ITARs) (22 CFR 125.03) prohibits the dissemination of certain types of technical data to foreign nationals. ISC may freely export CDK 7.0 under License Exception ENC (ECCN 5D002) to all but a handful of embargoed countries and denied parties. CDK 7.0 has been assigned a CCATS number of G026249.
ISC CDK is a trademark of Information Security Corporation. All other trademarks and/or registered trademarks are the properties of their respective owners.
This software is protected by U.S. Patents No. 5,274,707 and 5,373,560.
ISC Cryptographic Development Kit 7.0 User’s Guide, Second Edition (July 2006)
1011 Lake St., Suite 425
Oak Park, IL 60301
Product Information: +1 708 445-1704
Technical Support: +1 708 445-9415
E-Mail Support: firstname.lastname@example.org
|ISC Cryptographic Development Kit - User's Guide|
|Questions? E-mail ISC technical support|
|Copyright© 2002-2010 Information Security Corp. All rights reserved.|