Computer Security Institute

Results: 1676



#Item
421Cyberwarfare / Information security / Chief information security officer / Vulnerability / Application security / Asset / Radio-frequency identification / Computer security / Data security / Security

Earth-Life Science Institute Tokyo Institute of Technology Operating Guidelines for Information Security

Add to Reading List

Source URL: www.elsi.jp

Language: English - Date: 2014-06-29 01:12:20
422Public safety / Data security / Cyberwarfare / National Cyber Security Division / Information security / Vulnerability / United States Department of Homeland Security / Cyber-security regulation / Institute for Information Infrastructure Protection / Computer security / Security / Hacking

Private Sector Cyber Security Investment Strategies: An Empirical Analysis* Brent R. Rowe Technology Economics and Policy RTI International

Add to Reading List

Source URL: weis2006.econinfosec.org

Language: English - Date: 2006-07-20 16:57:22
423Public safety / Computer network security / Crime prevention / SANS Institute / Information security / Security controls / Mobile device / Corporate security / Security / Computer security / Data security

Security Policy for the use of handheld devices in corporate environments

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2013-06-12 11:13:30
424Technology / Privacy / Computer network security / Crime prevention / National security / Internet privacy / Cyberwarfare / Information privacy / Computer security / Ethics / Security / Internet ethics

Speech to the Institute of Directors Breakfast by Ian Fletcher, Director, Government Communications Security Bureau Tuesday 24 February 2015 Some months ago, at a forum sponsored by the Privacy Commissioner, I started to

Add to Reading List

Source URL: www.gcsb.govt.nz

Language: English - Date: 2015-03-09 19:51:04
425National security / Public safety / Computer crimes / Crime prevention / Cyberspace / Cyberterrorism / Crime statistics / Internet-related prefixes / Right Realism / Law enforcement / Criminology / Crime

INTERNET CRIME PREVENTION Adam Sutton, David Tait, Shane McKenzie and Fiona Bavinton Paper presented at the conference: Internet Crime held in Melbourne, 16-17 February 1998, by the Australian Institute of Criminology

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-06-09 04:55:33
426Computer security / Cryptographic hash functions / OpenSSL / Open Source Software Institute / FIPS 140-2 / FIPS 140 / SHA-1 / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module Version[removed]By the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-02-06 16:03:20
427United States Department of Homeland Security / Cyberwarfare / Public safety / Security engineering / International Multilateral Partnership Against Cyber Threats / Critical infrastructure protection / Computer security / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / National security / Security / Computer crimes

Submission to the National Commission of Audit from the Australian Strategic Policy Institute (ASPI) regarding National Security Overview This submission addresses the National Commission of Audit’s terms of reference

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2014-02-13 22:52:14
428Australian Institute of International Affairs

  Managing  Director  of  Sharon  Brown  and  Associates  founded  2009.     Adjunct  Associate  Professor,  School  of  Computer  and  Security   Science,

Add to Reading List

Source URL: astronomy.swin.edu.au

Language: English - Date: 2013-10-29 06:21:06
    429Computing / Software testing / Web application security scanner / Vulnerability / Application security / Software assurance / Web application security / Malware / National Institute of Standards and Technology / Computer security / Cyberwarfare / Computer network security

    SAMATE Project Update Paul E. Black Romain Gaucher National Institute of Standards and Technology http://samate.nist.gov/ [removed]

    Add to Reading List

    Source URL: samate.nist.gov

    Language: English - Date: 2013-05-07 16:54:57
    430Computing / National Institute of Standards and Technology / Risk management / NIST Special Publication 800-53 / Federal Information Security Management Act / Risk management framework / Security controls / Information security / Security risk / Security / Computer security / Data security

    NIST Special Publication[removed]Revision 4

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-01-29 02:15:37
    UPDATE