and Security Technologies

Results: 1110



#Item
901Technology / Communication / Development / Information and communication technologies for development / Information technology / Food industry / Food security / Kenya Agricultural Commodity Exchange / Esoko / Agriculture / Food and drink / Land management

Issue 77 April 2014 the digital springboard for inclusive agriculture

Add to Reading List

Source URL: ictupdate.cta.int

Language: English - Date: 2014-05-20 05:14:11
902Security / Federal Bureau of Investigation / Central Intelligence Agency / Secretaría de Inteligencia / Military intelligence / Department of Defense Cyber Crime Center / Cyberwarfare in the United States / Espionage / Cyberwarfare / National security

FBI Special Technologies and Applications Section (STAS) Final 300 FY 08

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2013-07-18 16:06:07
903Information and communication technologies in education / Information and communications technology / Information technology / Communication / Technology

Addressing societal concerns on legal and privacy issues in ICT-related projects Trustworthy ICT Research in Europe for ICT Security Industry, ICT Security Users and Researchers FIRE

Add to Reading List

Source URL: www.trustworthyictonfire.com

Language: English - Date: 2014-03-11 05:07:17
904Framework Programmes for Research and Technological Development / Future Internet / Information and communication technologies in education / Computing / Information society / Internet governance / United Nations Information and Communication Technologies Task Force / Information technology / Technology / Institute for Information Infrastructure Protection

Final Pan-cluster strategy and research agenda and EC recommendations Trustworthy ICT Research in Europe for ICT Security Industry, ICT Security Users and Researchers Facilitate Industry and

Add to Reading List

Source URL: www.trustworthyictonfire.com

Language: English - Date: 2014-07-01 07:43:24
905The Oval / Cricket in England / Sport in the United Kingdom / Mitre Corporation / Open Vulnerability and Assessment Language / Sport in London

OVAL Board Meeting[removed]Attendees Chandrashekhar B – SecPod Technologies Alberto Bastos – Modulo Aharon Chernin – DTCC Blake Frantz – Center for Internet Security

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-10-27 08:46:35
906United States Department of Homeland Security / United States Intelligence Community / 9/11 Commission / National Counterterrorism Center / Central Intelligence Agency / Government of the United States / National Security and Homeland Security Presidential Directive / Integrated Planning System / Government / National security / Public safety

Administration of George W. Bush, [removed]Aug. 27 (k) recommended research and development on technologies designed to enhance screening effectiveness and further protect privacy interests; and (l) a plan for incorporatin

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2012-07-17 13:33:22
907NetScreen Technologies / Computer security / Cyberwarfare / Virtual private network / FIPS 140 / Internet security / Critical Security Parameter / Secure Shell / Computer network security / Computing / Juniper Networks

FIPS[removed]SECURITY POLICY Juniper Networks NetScreen-500 HW P/N NS-500 VERSION 4110 FW VERSIONS SCREENOS 5.0.0R9.H, SCREENOS 5.0.0R9A.H AND SCREENOS 5.0.0R9B.H Juniper NS-500 Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
908Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Juniper Networks / Verisign / Internet / Junos / Network security / Prolexic Technologies / Computing / Computer network security / Cyberwarfare

SOLUTION BRIEF ALWAYS-ON DDOS PROTECTION FROM JUNIPER NETWORKS AND VERISIGN Improve Network Availability and Performance through Real-Time Adaptive DDoS Mitigation

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-07-03 10:10:04
909FIPS 140 / Smart card / Zeroisation / Cryptography / Cryptography standards / FIPS 140-2

Baltimore ACCE[removed]FIPS[removed]Security Policy Copyright © 2000 Baltimore Technologies Ltd. This document may be reproduced and distributed providing such a reproduction is complete and unmodified.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
910Computer security / Computer network security / Juniper Networks / NetScreen Technologies / FIPS 140 / RADIUS / Critical Security Parameter / Virtual private network / Zeroisation / Computing / Cryptography / Cryptography standards

FIPS[removed]SECURITY POLICY Juniper Networks NetScreen[removed]HW P/N NS-204 AND NS-208 VERSION 0110 FW VERSIONS SCREENOS 5.0.0R9.H, SCREENOS 5.0.0R9A.H AND SCREENOS 5.0.0R9B.H

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE