Computer Security Institute

Results: 1676



#Item
241Management / Computer security / Computer network security / Vulnerability / Asset / Social vulnerability / Probabilistic risk assessment / Attack / International Institute for Applied Systems Analysis / Security / Risk / Risk analysis

Systems and Risk Analysis for Food Protection and Security Detlof von Winterfeldt International Institute for Applied Systems Analysis Laxenburg, Austria

Add to Reading List

Source URL: nabc.cals.cornell.edu

Language: English - Date: 2013-07-23 14:05:44
242Computer security / Application firewall / Information security / Software as a service / Cloud communications / IICCRD / Centralized computing / Cloud computing / Computing

Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-24 12:29:05
243Computing / Cyberwarfare / Computer network security / Data breach / Secure communication / Information security / Data loss / Malware / Remote data deletion / Data security / Security / Computer security

2013 Cost of Data Breach Study: United States Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-06-04 16:37:57
244FireEye /  Inc. / Internet / Malware / Antivirus software / Computer virus / Japan Advanced Institute of Science and Technology / Email / Firewall / World Wide Web / Computing / Computer network security / Computer security

CUSTOMER STORY FireEye NX Early Detection of Malicious Callback Communication Protects JAIST Without Hindering Research

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 19:34:41
245FireEye /  Inc. / Internet / Malware / Antivirus software / Computer virus / Japan Advanced Institute of Science and Technology / Email / Firewall / World Wide Web / Computing / Computer network security / Computer security

CUSTOMER STORY FireEye NX Early Detection of Malicious Callback Communication Protects JAIST Without Hindering Research

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 19:34:41
246Data security / Cyberwarfare / Computing / Secure communication / National security / Data breach / Information security / Data loss / Database / Security / Computer security / Computer network security

2013 Cost of Data Breach Study: Global Analysis Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC May 2013

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-06-04 21:41:15
247FireEye /  Inc. / Internet / Malware / Antivirus software / Computer virus / Japan Advanced Institute of Science and Technology / Email / Firewall / World Wide Web / Computing / Computer network security / Computer security

CUSTOMER STORY FireEye NX Early Detection of Malicious Callback Communication Protects JAIST Without Hindering Research

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 19:34:41
248Crime prevention / Mass surveillance / Privacy of telecommunications / Law enforcement / National Security Agency / Surveillance / Foreign Intelligence Surveillance Act / Computer security / Cloud computing / National security / Security / Public safety

July 2014 New America’s Open Technology Institute Policy Paper Surveillance Costs:

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-03-02 05:09:02
249Crime prevention / Data security / Information security / National security / Password / Operating system / Internet / Technology / Institute of Engineering / Security / Computer security / Digital media

Remote Access and Mobile Working Policy Document Status Security Classification

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-05 02:08:53
250Computer security / Penetration test / Vulnerability / Fuzz testing / Security testing / European Telecommunications Standards Institute / Application security / Load testing / Black-box testing / Software testing / Evaluation / Software quality

TRV1Methods for Testing and Specification (MTS); Security Testing; Basic Terminology

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-03-27 04:39:45
UPDATE