Computer Security Institute

Results: 1676



#Item
311National security / Series / Public safety / Computer Security Institute / CSI / Information security / Computer security / Security / CSI: Crime Scene Investigation / Crime prevention

2007_CSI_Survey_v10_COVER_PRINT.indd

Add to Reading List

Source URL: i.cmpnet.com

Language: English - Date: 2007-09-18 12:51:41
312Theft / Data collection / Crimes / Laptop theft / Laptops / Computer crime / Computer Security Institute / Computer fraud / Cyberwarfare / Hacking / Technology / Law

COMPUTER SECURITY ISSUES&TRENDS V O L . V I I I , N O . 1

Add to Reading List

Source URL: i.cmpnet.com

Language: English - Date: 2003-07-16 12:19:13
313Windows NT / Booting / Disk file systems / Advanced RISC Computing / File system / System partition and boot partition / Disk partitioning / Security Accounts Manager / Drive letter assignment / System software / Microsoft Windows / Software

Patagonia - A Dual Use Cluster of PCs for Computation and Education Felix Rauch Christian Kurmann Blanca Maria M¨uller-Lagunez Thomas M. Stricker Laboratory for Computer Systems ETH - Swiss Institute of Technology CH-80

Add to Reading List

Source URL: www.cs.inf.ethz.ch

Language: English - Date: 1999-10-30 12:36:08
314Market research / Research methods / Psychometrics / Sociology / Marketing / Computer Security Institute / Survey methodology / Information security / Telecommuting / Statistics / Science / Data collection

EIGHTH ANNUALCSI/FBI COMPUTER CRIME

Add to Reading List

Source URL: i.cmpnet.com

Language: English - Date: 2003-07-16 12:19:13
315Federal Information Security Management Act / Internet privacy / Law / Computing / Government / Computer law / Gaithersburg /  Maryland / National Institute of Standards and Technology

Microsoft Wordpi.docx

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-01-01 08:13:50
316Electronic warfare / Hacking / Computer security / Military technology / National security / Threat / Central Intelligence Agency / Computer network security / Security / Cyberwarfare

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: www.webroot.com

Language: English - Date: 2015-03-27 15:18:02
317Cyberwarfare / Spamming / Multi-agent systems / Antivirus software / Malware / Botnet / Vulnerability / Attack / Srizbi botnet / Computer network security / Computing / Computer security

Filed via online portal November 14, 2011 National Institute of Standards and Technology at the U.S. Department of Commerce 1401 Constitution Avenue, NW Room 4822

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:27:13
318Systems engineering / Dependability / Ambient intelligence / Computer security / Cloud computing / Reliability engineering / Institute for Applied Information Processing and Communications / Security / Prevention / International Conference on Availability /  Reliability and Security

http://www.ares-conference.eu ARES[removed]Call for Papers The Tenth International Conference on Availability, Reliability and Security (ARES[removed]August 24th – 28th, 2015, Toulouse, France

Add to Reading List

Source URL: www.ares-conference.eu

Language: English - Date: 2015-03-02 09:49:17
319Computer network security / Software testing / Risk management / National security / Vulnerability / Password / Attack surface / Risk / Computer insecurity / Cyberwarfare / Computer security / Security

Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
320Email / Cybercrime / Computer network security / Cyberwarfare / Malware / Email spam / Targeted threat / Internet security / Spam / Internet / Computing / Spamming

A Look at Targeted Attacks Through the Lense of an NGO Stevens Le Blond, Adina Uritesc, and Cédric Gilbert, Max Planck Institute for Software Systems (MPI-SWS); Zheng Leong Chua and Prateek Saxena, National University o

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-20 18:13:41
UPDATE