Computer Security Institute

Results: 1676



#Item
261Law / Privacy / Internet privacy / National Institute of Standards and Technology / Privacy Office of the U.S. Department of Homeland Security / IT risk / Ethics / Computer security / Information technology management

Summary of the Privacy Engineering Workshop at the National Institute of Standards and Technology (April 9-10, 2014)

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-05-21 09:55:14
262Cyberwarfare / Honeypot / Honeyd / Network telescope / Network address translation / Denial-of-service attack / Dynamic Host Configuration Protocol / Client honeypot / Computer network security / Internet / Computing

INTERNATIONAL COMPUTER SCIENCE INSTITUTE 1947 Center St. • Suite 600 • Berkeley, California • ( • FAXGQ: Realizing a System to Catch Worms in a Quarter Million Places

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2006-09-07 19:03:47
263Cyberwarfare / Network architecture / Data security / IP address spoofing / Denial-of-service attack / SYN flood / Transmission Control Protocol / Ingress filtering / Firewall / Computer network security / Denial-of-service attacks / Computing

RAD: Reflector Attack Defense Using Message Authentication Codes Erik Kline† Matt Beaumont-Gay† Jelena Mirkovic? Peter Reiher† for Advanced Systems Research ? Information Sciences Institute UCLA Computer Science US

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2010-12-13 19:36:16
264Computer security / Gaithersburg /  Maryland / National Institute of Standards and Technology / Open data / Open access / Academia / PubMed Central / Publishing / National Institutes of Health / Standards organizations / Medicine

NIST Plan for Providing Public Access to the Results of Federally Funded Research

Add to Reading List

Source URL: www.arl.org

Language: English - Date: 2015-04-06 16:41:39
265Computer security / Computer network security / Crime prevention / Electronic commerce / National security / Trust / Institute for Information Infrastructure Protection / Data security / Information Trust Institute / Ethics / Security / Computer crimes

National Cyber Leap Year Summit 2009

Add to Reading List

Source URL: tahoe-lafs.org

Language: English - Date: 2014-12-16 18:34:05
266Ethics / Cyberwarfare / Data breach / Information security / Internet privacy / Privacy / Information privacy / Security / Computer security / Data security

Aftermath of a Data Breach Study Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2013-01-21 11:58:32
267Computing / Cyberwarfare / Computer network security / Data loss prevention software / SANS Institute / Websense / Data loss / Data breach / Information security / Computer security / Security / Data security

Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permited without express written permission.

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2010-01-04 21:00:34
268Crime prevention / Computer security / Data security / Identity theft / Information security / Critical infrastructure protection / Institute for Information Infrastructure Protection / Risk / Business continuity planning / Security / National security / Public safety

1001 PENNSYLVANIA AVE., NW SUITE 500 SOUTH WASHINGTON, DCTELFAX

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:27:34
269Software engineering / Computer security / Crime prevention / National security / Software assurance / Software Engineering Institute / Application security / Software development process / Vulnerability / Security / Computing / Software quality

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:46:06
270Science / Software quality / Anticipatory thinking / Source code / Reliability engineering / Software development process / Software Engineering Institute / Configuration management / Computer security / Software development / Software engineering / Systems engineering

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:45:55
UPDATE