Computer Security Institute

Results: 1676



#Item
231Database / Computer-aided dispatch / Prevention / Security / Dangerous goods / Safety / Routing

HAZMAT Transportation Routing, Monitoring and Incident Solving in GIS Environment Trnka Jiri International Master’s Programme in Traffic Environment and Safety Management, Linköping Institute of Technology, Linköping

Add to Reading List

Source URL: itcnt05.itc.nl

Language: English - Date: 2005-02-02 17:00:00
232Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 19:39:09
233Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 15:05:36
234Veracode / Open-source software / Parasoft / Debian / Computer security / Software / Computing / Cloud computing

Software Assurance Marketplace (SWAMP) Team Designing, building, and operating the SWAMP is a joint effort of four research institutions: Morgridge Institute for Research (lead), Indiana University, University of Illinoi

Add to Reading List

Source URL: www.signup4.net

Language: English
235Computing / Hacking / FireEye /  Inc. / Federal Information Security Management Act / NIST Special Publication 800-53 / Malware / Consensus audit guidelines / SANS Institute / Vulnerability / Computer security / Cyberwarfare / Computer network security

FireEye Government Solution Mapping Guide for FISMA and SANS Critical Security Controls FISMA and SANS Critical Security Controls Driving Compliance In a bid to bolster cyber security today’s highly networked computing

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 15:05:36
236Wi-Fi / Computer network security / TAFE NSW / Technical and further education / Password

Connecting to the TAFE NSW - Illawarra Institute Wireless Network (II-TAFE) Guide for Android 4.0+ devices For students and staff using devices not supplied by TAFE/DEC Disclaimer TAFE NSW, DEC and Illawarra Institute do

Add to Reading List

Source URL: www.tafeillawarra.edu.au

Language: English - Date: 2013-01-15 17:42:09
237Federal Information Security Management Act / Security Content Automation Protocol / Cyberwarfare / National Institute of Standards and Technology / FIPS 140 / Federal Desktop Core Configuration / Extensible Configuration Checklist Description Format / NIST Special Publication 800-53 / Computer security / Computing / Security

FDCC/USGCB  2006 – 2014 Federal Desktop Core Configuration & United States Govt. Configuration Baseline  What is FDCC/USGCB? OMB initiative to provide mandatory/uniform configurations for commonly used operating

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-12 09:45:32
238Public safety / Standards organizations / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Cloud computing / Computer network security / Security / Computer crimes

Update on the Cybersecurity Framework July 31, 2014 The Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”) was issued on February 12, 2014, as directed by the President in Executive Order

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-07-31 16:13:52
239Ethics / Public safety / Information security / Data breach / Internet privacy / Information privacy / Privacy / Security / Data security / Computer security

Is Your Company Ready for a Big Data Breach? Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2013-04-30 10:27:36
240Computer security / NIST Special Publication 800-53 / National Institute of Standards and Technology / International Multilateral Partnership Against Cyber Threats / Security Assertion Markup Language / OASIS / Security / Computing / Computer crimes

MQTT and the NIST Cybersecurity Framework Version 1.0 Committee NoteMay 2014 Specification URIs This version:

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2014-05-28 12:00:00
UPDATE