Computer Security Institute

Results: 1676



#Item
361Computing / European Telecommunications Standards Institute / ISO/IEC 27002 / Information security / Service provider / ISO/IEC 27001 / Security controls / Data security / Computer security / Security

draft ETSI EN[removed]V1[removed]European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-15 09:16:45
362USB flash drive / USB 3.0 / University of Hong Kong / Computer security / Flash memory / Computer hardware / Hong Kong Applied Science and Technology Research Institute / Universal Serial Bus

Silicon Valley’s Velosti Develops High-Speed Data Security Technology in Hong Kong Stanford researchers obtained government support conducting HK$22.5 million research and development project on next-generation secure

Add to Reading List

Source URL: www1.investhk.gov.hk

Language: English - Date: 2014-04-14 05:06:00
363Data security / Cryptography standards / Computer network security / United States government secrecy / Security controls / FIPS 140-2 / Open Source Software Institute / OpenSSL / Global Information Assurance Certification / Security / Computer security / Computing

Global Information Assurance Certification Paper This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Copyright SANS Institute Author Retai

Add to Reading List

Source URL: www.oss-institute.org

Language: English - Date: 2012-10-17 10:57:26
364Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
365Face recognition / Surveillance / Crime prevention / Automatic identification and data capture / Facial recognition system / Face detection / Closed-circuit television / Institute of Electrical and Electronics Engineers / Cellular neural network / Security / National security / Public safety

Microsoft Word - vp4s-06-intro.doc

Add to Reading List

Source URL: www.computer-vision.org

Language: English - Date: 2011-04-19 21:37:03
366Public safety / Crime prevention / Privacy / Video / Closed-circuit television / Digital video recorder / Video camera / Webcam / Face detection / Security / National security / Surveillance

ACE Surveillance: the next generation surveillance for long-term monitoring and activity summarization Dmitry O. Gorodnichy Institute for Information Technology (IIT-ITI) National Research Council of Canada (NRC-CNRC)

Add to Reading List

Source URL: www.computer-vision.org

Language: English - Date: 2011-04-19 21:37:08
367Director of National Intelligence / Computer security / Government / Engineering / Intelligence Advanced Research Projects Activity / Security / Disruptive Technology Office / Institute of Electrical and Electronics Engineers

NICIAR: Pursuing Disruptive Technologies for Information Assurance Carl E. Landwehr, Ph.D. Chief of the Cyber Access and Protection Division of the Disruptive Technology Office under the Director of National Intelligence

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 12:51:08
368Grants / Computer network security / National Strategy for Trusted Identities in Cyberspace / Computer security / Public economics / Funding Opportunity Announcement / Federal grants in the United States / Identity theft / National Institute of Standards and Technology / Identity / Federal assistance in the United States / Public finance

FFO for the 2015 NSTIC pilots

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-11 17:04:10
369Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
370Information Risk Management / Risk management / Department of Defense Information Technology Security Certification and Accreditation Process / Risk / Information assurance / Parameter / Rader / Vulnerability / Grace Communion International / Computer security / Management / Ethics

The Rader Network Joint Institute for Computational Sciences

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-22 09:55:12
UPDATE