Computer Security Institute

Results: 1676



#Item
91Data security / Computer security / Security / National Institute of Standards and Technology / Federal Information Security Management Act / Security controls / Key management / Information security / Personally identifiable information / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service

Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-05 09:50:54
92

A Hypervisor Based Security Testbed Dan Duchamp and Greg DeAngelis Computer Science Department Stevens Institute of Technology Hoboken, NJUSA ,

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2007-07-19 12:41:36
    93Computer security / Address space layout randomization / Malware / Cyberwarfare

    Attacker “Math” 101 Professor Dai Zovi Institute for the Advancement of Memory Corruption What is this all

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    94

    Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2016-01-19 19:26:32
      95Computer security / Computing / Security / Computer network security / Hacking / Global Information Assurance Certification / SANS Institute / White hat / Penetration test / Professional certification / Security hacker

      Penetration Testing & Ethical Hacking Graduate Certificate The SANS Technology Institute’s post-baccalaureate certificate program in Penetration Testing & Ethical Hacking is based entirely upon four courses already ava

      Add to Reading List

      Source URL: www.sans.edu

      Language: English - Date: 2015-08-20 16:00:38
      96Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

      BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2007-05-15 01:33:26
      97Global Information Assurance Certification / Computer security / Professional certification / SANS Institute

      SANS Technology Institute Bind In Brochure

      Add to Reading List

      Source URL: www.sans.edu

      Language: English - Date: 2016-01-13 10:48:31
      98Global Information Assurance Certification / Computer security / Security

        The  SANS  Technology  Institute  makes  shorter  groups  of  courses  available  to  students  who  are  unable  to   commit  to  a  full  master’s  de

      Add to Reading List

      Source URL: www.sans.edu

      Language: English - Date: 2015-08-24 10:00:22
      99

      Targeted Risk Communication for Computer Security Jim Blythe USC Information Sciences Institute

      Add to Reading List

      Source URL: trellis.semanticweb.org

      Language: English - Date: 2012-02-21 19:56:17
        100Computer security / Security / Global Information Assurance Certification / Computing / SANS Institute / Malware analysis / Computer security incident management / Malware / Computer forensics / Professional certification

        The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

        Add to Reading List

        Source URL: www.sans.edu

        Language: English - Date: 2015-08-20 16:00:38
        UPDATE