RICOH

Network Security White Papers

Group
Document Version
Target Models
A
v. A.1.2
Model A-C3, A-C3e/f, Model B-C2, Model R-C3, Model C-P1, Model K-P3, Model K-C2, Model J-C1, Model S-C2
B
v. B.1.0
Model J-P3, Model PL-P1
C
v. C.1.1
Model C-P2c, Model G-P1, Model J-C2, Model K-P4, Model MT-C2, Model MT-P1, Model TH-C1, Model V-C1
D
v. D.1.1
Model A-C4, Model R-C4, Model J-P4, Model A-C4.5, Model R-C4.5
E
v. E.1.2
Model AT-C1, Model AP-C1, Model B-C3, Model MT-C3, Model PG-C1, Model G-P2, Model A-P4, Model AP-P1, Model MT-P2, Model S-C3, Model K-C3
F
v. F.1.0
Model SI-P1
G
v. G.1.2
Model Al-C1, Model R-C5, Model V-C2, Model Al-P1, Model Al-C1.5, Model R-C5.5
H
v. H.1.1
Model G-P3, Model AT-C2, Model AP-C2, Model DI-C1, Model DI-C1L
I
v. I.1.1
Model Kr-P2, Model S-C4, Model MT-C4, Katana-C2, Model AP-P2, Model SI-P2
J
v. J.1.2
Model V-C3, Model Z-P1, Model N-C3, Model MD-P2
K
v. K.1.0
Model AT/AP-C2.5, Model Z-C1, Model DI-C1.5