Center for Internet Security

Results: 308



#Item
221Internet / Cyberwarfare / Internet standards / Network performance / Data security / Firewall / Packet loss / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Network architecture

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-18 13:11:50
222Computer network security / Data security / Secure communication / Security awareness / Threat / Network security / Vulnerability / Internet privacy / Personally identifiable information / Computer security / Security / Cyberwarfare

For more information please visit the Privacy Technical Assistance Center: http://nces.ed.gov/ptac Data Security and Management Training: Best Practice Considerations Overview The U.S. Department of Education established

Add to Reading List

Source URL: ptac.ed.gov

Language: English - Date: 2014-06-22 01:32:14
223Public safety / Computer crimes / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Cyberspace / National Cyber Security Division / National Cybersecurity Center / Security / United States Department of Homeland Security / Computer security

FOR IMMEDIATE RELEASE:  October 8, 2010  Contact:  Lindsey Bohrer, Public Information Officer (614) 752­6585  INTERNET SAFETY ENCOURAGED DURING NATIONAL  CYBERSECURITY AWARENESS MONTH 

Add to Reading List

Source URL: homelandsecurity.ohio.gov

Language: English - Date: 2012-08-22 11:43:39
224Internet hosting / Colocation centre / Web hosting / Data center / Colocation / Phoenix /  Arizona / Switch and Data / American Internet Services / Computing / Internet / Concurrent computing

Cox Business keeps your business GOING NO MATTER WHAT. The Cox Business network offers potent combinations of security, redundancy and data center accessibility for Arizona businesses. Whether you have a

Add to Reading List

Source URL: www.coxbusinessaz.com

Language: English - Date: 2012-03-26 14:05:23
225Crime prevention / Law enforcement / National security / Privacy / United States Constitution / Internet privacy / Surveillance / Democratic Party / Electronic Privacy Information Center / Ethics / Human rights / Security

FOR IMMEDIATE RELEASE CONTACT: Ashley Berke National Constitution Center[removed]

Add to Reading List

Source URL: constitutioncenter.org

Language: English - Date: 2012-10-09 20:11:15
226Spamming / Electronic commerce / Spam filtering / Computer network security / Anti-spam techniques / Backup / Spam / Data center / Computer security / Computing / Internet / Email

MARKETBRIEF E-mail Security and Reliability for Higher Education Few organizations rely more on information sharing than colleges and universities. Administrators must communicate in order to plan

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2008-11-03 08:43:10
227Spyware / Rogue software / Adware / Computer network security / MS Antivirus / Keystroke logging / Internet Spyware Prevention Act / Center for Democracy and Technology / Anti-Spyware Coalition / Espionage / Malware / System software

Order Code RL32706 Spyware: Background and Policy Issues for Congress Updated November 25, 2008

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2009-01-07 20:22:35
228Spyware / Rogue software / Computer network security / Adware / Center for Democracy and Technology / Internet Spyware Prevention Act / MS Antivirus / Anti-Spyware Coalition / Keystroke logging / Espionage / Malware / System software

. Spyware: Background and Policy Issues for Congress Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2011-03-17 18:52:19
229Spyware / Rogue software / Computer network security / Adware / Center for Democracy and Technology / MS Antivirus / Anti-Spyware Coalition / Internet Spyware Prevention Act / Keystroke logging / Espionage / Malware / System software

. Spyware: Background and Policy Issues for Congress Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2009-07-06 20:40:07
230Information Sharing Environment / National security / Human rights / United States Department of Homeland Security / Internet privacy / Information sharing / Information privacy / Homeland Security Act / Fusion center / Ethics / Privacy / Government

Privacy and Civil Liberties Implementation Guide for the Information Sharing Environment Overview Purpose. The purpose of this document is to help Federal agencies implement the Guidelines to Ensure that the Informatio

Add to Reading List

Source URL: ise.gov

Language: English - Date: 2011-01-12 09:37:33
UPDATE