Computer Security Institute

Results: 1676



#Item
141Software testing / System software / Hacking / Secure Shell / Vulnerability / Nessus / Password / Penetration test / Malware / Computer security / Computer network security / Cyberwarfare

Appendix A Air Force Institute of Technology Penetration Test of Simulated Election Test Report

Add to Reading List

Source URL: www.fvap.gov

Language: English - Date: 2015-04-24 11:32:24
142Management / Public safety / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / Security risk / Security / Computer security / Computer crimes

Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2015-03-25 14:03:24
143Computing / Standards organizations / Computer security / Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Metrology / Cloud computing / Smart grid / Security / Crime prevention / National security

Information Technology Laboratory Letter from the Director T

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-05-19 13:24:18
144Data security / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Privacy / Information security / Computing / NIST Enterprise Architecture Model / Computer security / Security / Ethics

Microsoft Word - M0395_v1_4717582962

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-04-26 21:21:41
145Secure communication / Mobile technology / Computer network security / Smart cards / Communication / Machine-to-Machine / Gemalto / European Telecommunications Standards Institute / Cinterion Wireless Modules GmbH / Technology / Security / Electronic commerce

Security in Machine-to-Machine Communication: The role of the Telecommunication Operator © Cinterion Wireless Modules GmbH 2012, All rights reserved “Internet of Things” = Increasing

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2013-01-16 08:59:07
146Technology / Accreditation / Quality assurance / Email / Credit card / Card security code / WebEx / American National Standards Institute / Computer-mediated communication / Standards organizations / Computing

ISO/IEC:2015 Transition Training (Online via WebEx) Attendee name       Company      

Add to Reading List

Source URL: anab.org

Language: English - Date: 2015-05-18 12:29:35
147Cyberwarfare / DARPA / Computer security / National Security Agency / United States Department of Homeland Security / Multics / Melissa Hathaway / National Institutes of Health / Rainbow Series / Security / National security / Government

History of US Government Investments in Cybersecurity Research A Personal Perspective Carl E. Landwehr Institute for Systems Research University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:48
148Battelle Memorial Institute / United States Department of Energy National Laboratories / Stuxnet / Lawrence Livermore National Laboratory / Computer security / FLOPS / Internet privacy / Privacy / Blue Gene / Computing / Parallel computing / Cyberwarfare

COMPUTER SCIENCE JAN.29 FORTY-SECOND SERIES SPRING 2015

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2015-01-23 16:27:18
149Computer security / Cyberwarfare / United States Department of Homeland Security / Gaithersburg /  Maryland / National Institute of Standards and Technology / United States Computer Emergency Readiness Team

Microsoft PowerPoint - FFC Building Workshop CSET

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2015-03-25 14:08:26
150Software licenses / Computing / Computer law / Software testing / Software quality / Open-source software / Proprietary software / Vulnerability / Software development process / Computer security / Computer network security / Cyberwarfare

Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security Carl E. Landwehr Institute for Systems Research University of Maryland, College Park Abstract:

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
UPDATE