CSRC

Results: 4036



#Item
931Computer viruses / Computer network security / Antivirus software / Macro virus / Melissa / Computer worm / Happy99 / Polymorphic code / Linux malware / System software / Malware / Software

The Evolving Virus Threat Mr. Carey Nachenberg Chief Researcher, Symantec Corporation Over the past twenty years, computer viruses have evolved from simple computer programs capable of spreading on a single PC to complex

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
932Denial-of-service attacks / Internet / Simple Network Management Protocol / Port / Password / Denial-of-service attack / Internet protocol suite / LAND / Novell NetWare / Computing / Internet protocols / Computer network security

Penetration Analysis of a XEROX Docucenter DC 230ST: Assessing the Security of a Multi-purpose Office Machine  Thomas E. Daniels, Benjamin A. Kuperman, Eugene H. Spafford CERIAS T.R. No[removed]Center for Education and R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
933Crime prevention / National security / Information technology audit / Public safety / Computer forensics / Information security / Certified Information Systems Security Professional / Department of Defense Cyber Crime Center / Security / Computer security / Data security

Operational Computer Forensics – The New Frontier Michael J. Corby, CCP, CISSP Vice President,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
934Access control / Digital watermarking / Watermark / Audio watermark detection / Mobile agent / Aglets / Authentication / Intelligent agent / Watermarking / Security / Cryptography

Digital Watermark Mobile Agents* Jian Zhao and Chenghui Luo Fraunhofer Center for Research in Computer Graphics, Inc. 321 South Main Street Providence, RI 02903

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
935Cyberwarfare / Internet security / Firewall / Principle of least privilege / Computer virus / Sandbox / Computer network security / Security / Computer security

An Operating System Analog to the Perl Data Tainting Functionality Dana M. Madsen Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
936CERT Coordination Center / Andrew Carnegie / Association of American Universities / Mellon family / Information Networking Institute / Carnegie Mellon University / Carnegie Mellon Silicon Valley / Software Engineering Institute

TUTORIAL TITLE: A Case Study In Incident and Vulnerability Handling Coordination ABSTRACT: This 90 minute presentation will detail a 12-week examination of the

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
937Standards organizations / Thought / National Institute of Standards and Technology / Creative Commons / CC / Ethics / Common Criteria Testing Laboratory / Evaluation / Common Criteria / Open content

COMMON CRITERIA PROJECT: IMPLEMENTING THE MUTUAL RECOGNITION ARRANGEMENT Title of Panel: Common Criteria Project: Implementing the Mutual Recognition Arrangement Panel Chair: Eugene F. (Gene) Troy National Institute of S

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
938Formal methods / Formal specification / Java virtual machine / Kernel / Programming language / Specification / Computer security / Domain / Abstraction / Computing / Software / Cross-platform software

An Avenue for High Confidence Applications in the 21st Century Timothy W. Kremann William B. Martin Frank Seaton Taylor ftimk, bradm, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
939Information technology management / Software / Capability Maturity Model / Security / ISO/IEC 21827 / Security engineering / Certified Information Systems Security Professional / Process / Quality assurance / Software development / Software development process / Data security

The Systems Security Engineering Capability Maturity Model (SSE-CMM) Karen Ferraiolo ISSEA Director of Technical Development

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
940Data security / Computer security / Computer network security / Information security / Certified Information Systems Security Professional / National Security Agency / Penetration test / Cyber-security regulation / Security / National security / Crime prevention

CAREER DEVELOPMENT AND HIRING TRENDS INTO THE 21ST CENTURY The demand for Information Security professionals is continuing to grow. Yet, the next five years will bring further advances and shifts in paradigms and likely

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE