Computer Security Institute

Results: 1676



#Item
411Risk / Actuarial science / Ethics / Software Engineering Institute / Carnegie Mellon University / Threat / Security risk / CERT Coordination Center / Management / Security / Computer security

Introduction to the Security Engineering Risk Analysis (SERA) Framework

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2014-12-04 16:27:05
412Management / Security / Legal governance /  risk management /  and compliance / Computer security / Data security / Enterprise risk management / Regulatory compliance / Chief information security officer / Sarbanes–Oxley Act / Business / Auditing / Corporate governance

The Role of Governance, Risk Management & Compliance in Organizations Study of GRC practitioners Sponsored by RSA, The Security Division of EMC Independently conducted by Ponemon Institute LLC Publication Date: May 2011

Add to Reading List

Source URL: www.emc.com

Language: English
413Information technology management / Crime prevention / National security / Privacy / FTC Fair Information Practice / Trustworthy computing / Internet privacy / Security / Ethics / Computer security

Before the United  States  Department  of Commerce National  Institute  of Standards  and Technology In the  Matter of Request for Comments

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 16:52:17
414Certified Information Systems Security Professional / Data security / Federal Information Security Management Act / National Institute of Standards and Technology / Security / Computer security / Computing

FISSEA 28th Annual Conference - March 24-25, [removed]Preliminary Agenda

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-17 14:06:00
415Multi-agent systems / Cyberwarfare / Botnets / Malware / Computer worm / Zombie / Trojan horse / Email spam / Storm botnet / Spamming / Computer network security / Computing

Modeling Botnet Propagation Using Time Zones David Dagon1 Cliff Zou2 Wenke Lee1 1 College of Computing, Georgia Institute of Technology,

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:38:01
416GTK+ / Internet protocols / Computer network security / Cyberwarfare / Data security / Firewall / User Datagram Protocol / Network packet / Wireshark / Software / Computing / Data

A-11: Trace File Anonymization Thursday June 16, [removed]:30pm – 3:00pm Jasper Bongertz Senior Consultant | Fast Lane Institute for Knowledge Transfer

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2011-06-18 14:04:48
417Prevention / Software Engineering Institute / Federal Information Security Management Act / OCTAVE / Carnegie Mellon University / Information security / Vulnerability / Security risk / Computer security / Security / Public safety

A Taxonomy of Operational Cyber Security Risks Version 2

Add to Reading List

Source URL: resources.sei.cmu.edu

Language: English - Date: 2014-05-21 11:54:15
418Public safety / Security / National Institute of Information and Communications Technology / Computer security

1 Special Issue on Traceable and Secure Networks SHINODA Yoichi 1 Network security research at the National Institute of Information

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2008-10-29 14:54:35
419Quality assurance / ISO/IEC JTC1 / ISO 10303 / International Organization for Standardization / American National Standards Institute / Computing / Information technology management / Computer file formats / Computer security / Standards organizations / Evaluation / Accreditation

Base Standard Program ISO[removed]Environmental Management Systems CB Application for Accreditation FA 5001

Add to Reading List

Source URL: anab.org

Language: English - Date: 2014-12-29 17:01:35
420Business / International Organization for Standardization / Generalised Enterprise Reference Architecture and Methodology / ISO 10303 / Information security management system / Computer-integrated manufacturing / Information technology management / Technology / James G. Nell

N 441 Meeting Minutes ISO/TC 184/SC 5/WG 1 : 2000-SeptemberNational Institute of Standards and Technology, Gaithersburg, MD, USA

Add to Reading List

Source URL: www.mel.nist.gov

Language: English - Date: 2000-11-16 10:56:27
UPDATE