CSRC

Results: 4036



#Item
981Management / Calendars / COBOL / Hazards / Internet culture / Year 2000 problem / Inventory / Embedded system / Survivability / Business / Technology / Software bugs

FIND AND FIX Y2K EMBEDDED EQUIPMENT RISKS © 1998 Dick Lefkon[removed]Asst. Prof. of Information Technology New York University, NY, NY [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
982Antivirus software / Spyware / Trojan horses / Norton AntiVirus / Proprietary software / PKZIP / FidoNet / Computer virus / Bulletin board system / Malware / System software / Software

Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
983Crime prevention / National security / Computer network security / Key management / ISO standards / FIPS 140-2 / Key size / Information security / Password / Security / Computer security / Cryptography

NETWORK SECURITY FRAMEWORK: ROBUSTNESS STRATEGY Teri Arber, NSA Deb Cooley, NSA Steve Hirsch, NSA Martha Mahan, NSA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
984Software / Business software / Enterprise application integration / Cross-platform software / Enterprise software / Enterprise resource planning / Management information system / SAP AG / Enterprise system / Information technology management / Enterprise architecture / Business

Towards Security of Integrated Enterprise Systems Management Alexander D. Korzyk. Sr. Virginia Commonwealth University 4738 Cedar Cliff Road Chester, VA[removed]Voice: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
985National security / Electronic commerce / Secure communication / Database management systems / Public safety / Computer security / Information security / Database / Ring / Security / Computing / Crime prevention

Cost-Effective Protection of Information Systems Chair: Panelists: John Campbell, National Security Agency Tim Ehrsam, Oracle Corporation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
986Telecommunications / 999 / Callback / Telephony / Electronic engineering / Caller ID

Multilateral Security A concept and examples for balanced security Kai Rannenberg, Microsoft Research, Cambridge, UK, [removed] # Multilateral security considers different and possibly conflicting security requi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
987Computing / Cryptographic software / Hardware security module / Smart cards / Ubiquitous computing / Java Card

Open Platform Development THE OPEN PLATFORM PROTECTION PROFILE (OP3) TAKING THE COMMON CRITERIA TO THE OUTER LIMITS

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
988Information / Computing / IPsec / Network security / Data security / Internet security / Security and safety features new to Windows Vista / Computer network security / Data / Cryptographic protocols

High Performance Computing Security Jesse Pollard, Senior UNIX Analyst NAVOCEANO MSRC pollard@navo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
989Computer security / Computing / Mass surveillance / National Security Agency / United States government secrecy / Bell System Practices / Information security management system / Information security / United States Agency for International Development / Security / Data security / National security

Title of Panel: Progress of the Best Security Practices Subcommittee Panel Chair James P. Craft, CISSP Information Systems Security Officer (ISSO) United States Agency for International Development (USAID[removed]Pennsylva

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
990Management / Data security / Risk analysis / Risk management / Information security / Vulnerability / Threat / Asset / Business continuity planning / Security / Risk / Computer security

Rapid Risk Analysis for Information Security Panel Discussion Hilary H. Hosmer, Chair Data Security, Inc. 58 Wilson Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE