Computer Security Institute

Results: 1676



#Item
211Computer security / Cyberwarfare / Computer network security / Secure communication / Information security / Vulnerability / Advanced Encryption Standard / Cyber-security regulation / Security / Crime prevention / National security

Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F’SATI)

Add to Reading List

Source URL: www.fsati.org

Language: English - Date: 2015-03-20 02:29:15
212Windows Live OneCare / Computer security / Charitable organization / Homelessness / Software / System software / Antivirus software / Backup software

OneCare Foundation Criteria and Information 1. What are the project criteria? The ACNC Act requires that all Public Benevolent Institute’s projects must address one of the following criteria that arouse the compassion

Add to Reading List

Source URL: myonecare.com.au

Language: English - Date: 2015-01-07 22:30:37
213Computer security / Actuarial science / Risk management / Cyber-security regulation / Information security / Risk / Critical infrastructure / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Security / Public safety / National security

On behalf of the Information Technology Sector Coordinating Council (IT SCC), we appreciate the opportunity to provide input to the National Institute of Standards and Technology (NIST) to its Request for Information (RF

Add to Reading List

Source URL: www.it-scc.org

Language: English - Date: 2015-03-03 10:54:49
214Security / Data remanence / Sanitization / Universal Serial Bus / Censorship / National Institute of Standards and Technology / USB mass-storage device class / Data security / Computer hardware / National security

Review of Surplus Procedures for Electronic Devices with Storage – October 2014

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2014-11-10 10:30:13
215Threat / Insider / Computing / Data mining / Georgia Tech Research Institute / Cyber Insider Threat / Insider trading / Computer security / Computer network security / Cyberwarfare

A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches Jason R.C. Nurse1 , Philip A. Legg1 , Oliver Buckley1 , Ioannis Agrafiotis1 , Gordon Wright2 , Monica

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2014-07-17 08:03:36
216Public safety / Computing / Computer law / Federal Information Security Management Act / Security awareness / Information security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Information security management system / Computer security / Security / Data security

Introduction (why awareness; why training

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:55:59
217Modernist architecture / Pretty Good Privacy / Committee I / Internet / Computing / Computer security / Education in Ahmedabad / Indian Institute of Management Ahmedabad

b) Sub-Committees IIMA is governed by faculty committees. Such Committees are appointed by the Director after taking feedback from the faculty on the appointment of each Activity Head/Chairperson of the Area

Add to Reading List

Source URL: www.iimahd.ernet.in

Language: English - Date: 2012-01-30 04:57:06
218Computer security / Computing / Information technology audit / Computer networking / Network forensics / Mobile device forensics / Anti-computer forensics / Forensic science / Department of Defense Cyber Crime Center / Digital forensics / Computer forensics / Cybercrime

STMI@NUS STRATEGIC TECHNOLOGY MANAGEMENT INSTITUTE NICF-Advanced Digital Forensics

Add to Reading List

Source URL: www.stmi.nus.edu.sg

Language: English - Date: 2013-02-18 21:22:51
219Security / Authentication server / Cryptography / Cyberwarfare / Cognitive password / Password manager / Password / Computer security / Crypt

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon () Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-11-15 15:54:59
220Computer network security / Kerberos / Computing / Software patent / Free software / X Window System / Copyright / Software / Massachusetts Institute of Technology / Data

MASSACHUSETTS INSTITUTE OF TECHNOLOGY THE MIT KERBEROS CONSORTIUM Consortium Agreement (the “Agreement”) by and between the Massachusetts Institute of Technology, having a principal place of business at 77 Massachuse

Add to Reading List

Source URL: www.kerberos.org

Language: English - Date: 2007-11-27 12:57:59
UPDATE