Computer Security Institute

Results: 1676



#Item
121

Logic in Automatic Verification Javier Esparza Sofware Reliability and Security Group Institute for Formal Methods in Computer Science University of Stuttgart

Add to Reading List

Source URL: www7.in.tum.de

Language: English - Date: 2007-05-25 06:28:10
    122Data security / Computer network security / Threat / Vulnerability / Information security / Network security / Software Engineering Institute / Security information and event management / Cyber Insider Threat / Computer security / Cyberwarfare / Security

    WHITE PAPER Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program. This whitepaper explores the kinds of internal users who are most

    Add to Reading List

    Source URL: www.raytheoncyber.com

    Language: English - Date: 2015-07-20 11:10:08
    123Professional associations / Standards organizations / Computer network security / Security / Privacy / Internet privacy / Network security / Cloud computing / Institute of Electrical and Electronics Engineers / Ethics / International nongovernmental organizations / Human rights

    Microsoft Word - ICCC-PSC_final

    Add to Reading List

    Source URL: www.ieee-iccc.org

    Language: English - Date: 2015-02-06 01:08:02
    124Computer security / Crime prevention / National security / Secure communication / Certification / Cyberwarfare / Computer network security / Security / Electronic commerce

    ISA Security Compliance Institute and Wurldtech Partnership October 25, 2010 From ISA Press Release Research Triangle Park, North Carolina, USA (25 October 2010) –The ISA Security Compliance Institute (ISCI) and Wurldt

    Add to Reading List

    Source URL: www.wurldtech.com

    Language: English - Date: 2015-07-15 01:28:14
    125Computer network security / Hacking / National security / Vulnerability / Advanced persistent threat / Attack / Stuxnet / Cyberwarfare / Computer security / Security

    IBM’s Cyber Security Perspective Martin Borrett, Director of the IBM Institute for Advanced Security, Europe © 2011 IBM Corporation IBM’s Definition of Cyber Security

    Add to Reading List

    Source URL: www.infowar.it

    Language: English - Date: 2011-11-22 08:27:22
    126Identity / Identity management / Identity management systems / OpenID / Cloud computing / Karlsruhe Institute of Technology / Federated identity / Security / Computer security

    GI P_223 Cover.indd

    Add to Reading List

    Source URL: subs.emis.de

    Language: English - Date: 2014-03-12 10:34:48
    127National Institute of Standards and Technology / Computing / NIST Special Publication 800-53 / Federal Information Security Management Act / Standards for Security Categorization of Federal Information and Information Systems / Security controls / Information security / Federal Information Processing Standard / Committee on National Security Systems / Computer security / Security / Data security

    Microsoft Wordrev3-final-cleanerrata.docx

    Add to Reading List

    Source URL: www.cloudcontrols.org

    Language: English - Date: 2011-06-03 05:36:08
    128IP address / Transmission Control Protocol / Computing / Cyberwarfare / Application firewall / Computer security / Attack patterns

    Poster: An Automatic Multi-Step Attack Pattern Mining Approach for Massive WAF Alert Data Yang Zhang1,2 , Tingwen Liu1,2 , Jinqiao Shi1,2 , Panpan Zhang1,2 , Haoliang Zhang1,2 , Jing Ya1,2 1 Institute of Information Eng

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:24
    129Institute for Security and Development Policy / Cyberspace / Crime / Computer security / Sino-American relations / Cyberpunk / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / National security

    Policy Brief No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

    Add to Reading List

    Source URL: www.isdp.eu

    Language: English - Date: 2014-06-19 09:11:43
    130Computer security / Information technology / OWASP / Security / SAP AG / Application security / European Telecommunications Standards Institute / Web application security / Ambient intelligence / Computing / Computer network security / Technology

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2014-10-17 10:43:23
    UPDATE