Computer Security Institute

Results: 1676



#Item
391Quality assurance / American National Standards Institute / Information technology management / Standards / Computer security / Standards organizations / Evaluation / Accreditation

Base Standard Program ACEP Management Systems CB Application for Accreditation FA 5020

Add to Reading List

Source URL: anab.org

Language: English - Date: 2014-12-29 17:05:39
392Computer security / Electronic commerce / Public key certificate / European Telecommunications Standards Institute / Service provider / Certificate policy / Electronic signature / Information security / Digital signature / Cryptography / Key management / Public-key cryptography

Final draft ETSI EN[removed]V1[removed]European Standard

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2012-11-08 09:35:32
393Embedded system / Southwest Research Institute / Ring / Computer security / Research / Computing / Security / Computer network security / Hypervisor

Microsoft PowerPoint - 14_SWRI-UT

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
394Cryptographic protocols / Computer security / ANSI ASC X9.95 Standard / Time / Timestamp / National Institute of Standards and Technology

Microsoft Word - PR - CEIC EnScript 5-07.doc

Add to Reading List

Source URL: www.wetstonetech.com

Language: English - Date: 2010-09-02 14:45:24
395Public safety / Prevention / Computer Security Institute / Lynas / Information security / The Security Institute / Sherwood Applied Business Security Architecture / Security / Computer security / Crime prevention

Microsoft Word - COSAC Chairman Lifetime Achievement Award.doc

Add to Reading List

Source URL: www.cosac.net

Language: English - Date: 2010-02-11 10:34:36
396Network architecture / Firewall / Internet protocol suite / Transmission Control Protocol / Dynamic Host Configuration Protocol / IP fragmentation attacks / Network address translation / Computing / Computer network security / Internet

Basic Packet Filtering By Laura Chappell, Protocol Analysis Institute, LLC Note: This is Part One of a two-part article focusing on protocol analysis filtering for network troubleshooting, optimiza

Add to Reading List

Source URL: www.itprc.com

Language: English
397Computer network security / Computer security / National security / Secure communication / National Cybersecurity Center / National Institute of Standards and Technology / Public safety / National Cyber Security Division / Cyber Secure Institute / Cyberwarfare / United States Department of Homeland Security / Security

CYBERSECURITY AT NIST BY THE NUMBERS $262 billion

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-02-03 12:41:25
398National security / Electronic warfare / Hacking / Computer crimes / Military technology / United States Cyber Command / Cyber spying / Industrial espionage / Information Warfare Monitor / Cyberwarfare / Cybercrime / Espionage

Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia James Lewis Prepared for the Lowy Institute MacArthur Asia Security Project Executive summary Cyber infrastructure is critical to the global economy. Yet

Add to Reading List

Source URL: csis.org

Language: English - Date: 2013-03-07 12:35:38
399Quality assurance / American National Standards Institute / Standards / Information technology management / Computer security / Standards organizations / Evaluation / Accreditation

Base Standard Program ISO 9001 Quality Management Systems CB Application for Accreditation FA 5000

Add to Reading List

Source URL: anab.org

Language: English - Date: 2014-12-29 17:01:28
400Computer network security / Internet ethics / Crime prevention / National security / Massachusetts Institute of Technology / Project Athena / Internet privacy / Password / Authorization / Software / Computing / Security

Principles Of Responsible Use Of Project Athena Project Athena is M.I.T.’s computing facility for education. It consists of a networked system of workstations and services, and includes communication features that off

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-03-20 23:51:06
UPDATE