Computer Security Institute

Results: 1676



#Item
181National Institute of Standards and Technology / Government / Law / Computer law / Federal Information Security Management Act / NIST Special Publication 800-53 / OMB Circular A-130 / Personally identifiable information / Standards for Security Categorization of Federal Information and Information Systems / Security / Computer security / Data security

Case 1:12-cvABJ DocumentFiledPage 1 of 22 EXECUTIVE OFFICE OF THE PRESIDENT  

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-07-02 13:16:43
182Computer network security / Cyberwarfare / Computer networking / Transmission Control Protocol / Firewall / Transport layer / Packet loss / Packet Processing / Communications protocol / Data / Computing / Information

Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks Antonis Papadogiannakis*, Michalis Polychronakis†, Evangelos P. Markatos* * Institute of Computer Science, Foundation for Research and Techn

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 13:30:49
183Reverse engineering / Technology / Engineering / Business / Product lifecycle management / Measurement / Evaluation methods / Computer security / Patent law

Data Evaluation Environment- Necessity for Achieving the Goal of the Measurements Kostadin Doytchinov Institute for National Measurement Standards National Research Council Canada

Add to Reading List

Source URL: www.cenam.mx

Language: English - Date: 2009-09-10 09:31:06
184Computer crimes / Computer security / Malware / Vulnerability / Social engineering / Cloud computing / Phishing / Advanced persistent threat / Sotirios / Cybercrime / Computing / Cyberwarfare

Security and Privacy Research Challenges Sotiris Ioannidis Institute of Computer Science Foundation for Research and Technology - Hellas

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 15:06:11
185Disk encryption / Inode / Unix / Cryptographic software / HTTP cookie / Cross-site scripting / JavaScript / BitLocker Drive Encryption / Ln / Computing / Computer security / Software

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
186Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:28:01
187Cryptography / Password / HTTP cookie / JavaScript / Challenge-response authentication / Salt / Crypt / Cross-site scripting / PBKDF2 / Computer security / Computing / Cyberwarfare

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-07-10 13:02:28
188Law / Computer law / Data privacy / United States Department of Homeland Security / Electronic Privacy Information Center / Internet privacy / Privacy Act / Automated Targeting System / Medical privacy / Ethics / Privacy law / Privacy

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE INSTITUTE OF EDUCATION SCIENCES of the DEPARTMENT OF EDUCATION Notice of New System of Records:

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-08-02 10:57:36
189United States Department of Homeland Security / Cyberwarfare / Public safety / Security engineering / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / National security / Security / Computer crimes

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
190Data privacy / Law / Computer security / Data security / Health Insurance Portability and Accountability Act / Electronic health record / Canadian Institute for Health Information / Internet privacy / Information privacy / Privacy / Ethics / Security

  Health Big Data in the Government Context Data-driven and information-based systems have quickly become the new paradigm for American health care. Using the vast amounts of data produced from both traditional healthc

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2015-04-21 15:59:58
UPDATE