Computer Security Institute

Results: 1676



#Item
161ISECOM / Prevention / Penetration test / Public safety / Pete Herzog / Data security / Information security / Test automation / Software testing / Security / Computer security

INSTITUTE FOR SECURITY AND OPEN METHODOLOGIES OSSTMM 2.1. Open-Source Security Testing Methodology Manual Created by Pete Herzog

Add to Reading List

Source URL: www.tecnoteca.it

Language: English - Date: 2008-12-29 06:35:07
162Computer security / Android / Malware / Embedded Linux / Rootkit / Rooting / Ptrace / Privilege escalation / Linux Security Modules / Computing / Smartphones / Software

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
163Public safety / Birla Institute of Technology and Science / Computer security / Information security / Institute of Electrical and Electronics Engineers / Security engineering / Cloud computing / Knowledge management / Pilani / Security / Crime prevention / National security

CALL FOR PAPERS A Special Issue on Secure Knowledge Management in Big-data era Information is increasingly becoming important in our daily lives. We have become information dependents of the twenty-first century, living

Add to Reading List

Source URL: www.som.buffalo.edu

Language: English - Date: 2014-06-30 22:56:35
164Computing / National Institute of Standards and Technology / NIST Special Publication 800-53 / Risk management / Federal Information Security Management Act / Security controls / Information security / Risk management framework / Privacy / Computer security / Security / Data security

DRAFT Special Publication 800-53A Revision 4, Federal Information Systems and Organizations: Building Effective Assessment Plans has been approved as FINAL by the following publication: Publication Number: Special Publi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-12 11:42:50
165Computer network security / Computer security / Cryptography standards / Secure communication / CRYPTREC / Cryptography / Information security / Network security / National Security Agency / Security / Crime prevention / National security

Network Security Research Institute Organization of the Network Security Research Institute, NICT NICT

Add to Reading List

Source URL: nict.go.jp

Language: English - Date: 2014-08-13 01:28:32
166Computer security / Identity management / Mandatory access control / Database / Capability-based security / Security / Database management systems / Access control

On the Unification of Access Control and Data Services David Ferraiolo1, Serban Gavrila1, Wayne Jansen2 1 National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-28 16:26:44
167Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
168Information systems / Computer security / Access control / Authorization / Human resource management system / Internet privacy / Electronic human resources / HRHIS / Human resource management / Security / Management

Virginia Polytechnic Institute and State University NoRev.: 3

Add to Reading List

Source URL: www.policies.vt.edu

Language: English - Date: 2013-08-06 11:47:17
169Human development / Adolescence / Social networking service / Youth / Multimedia / Biomonitoring / Computer security / Threat / Internet privacy / Computer network security / Security / Technology

MULTIMEDIA AS AN EMERGING CYBERTHREAT IN MODERN SOCIAL NETWORKS Z. Minchev, V. Dimitrov, M. Tulechka, L. Boyanov Institute of ICT/Institute of Mathematics & Informatics, BAS, University of National & World Economy Sofia

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:41:34
170Security / Health informatics / Computer security / Data privacy / Health Insurance Portability and Accountability Act / Electronic health record / Information privacy / Chief privacy officer / Data breach / Privacy / Ethics / Health

DOING IT RIGHT: GETTING A JUMP ON PRIVACY AND SECURITY Global Institute for Emerging Healthcare Practices

Add to Reading List

Source URL: jaredrhoads.com

Language: English - Date: 2014-12-17 11:21:13
UPDATE