Computer Security Institute

Results: 1676



#Item
451Computer network security / Disaster preparedness / CERIAS / Purdue University / Gene Spafford / Attack / Incident response team / Computer security / Emergency management / Public safety

Special Publication[removed]Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology

Add to Reading List

Source URL: infohost.nmt.edu

Language: English - Date: 2007-01-29 12:41:51
452Crime prevention / Computer network security / Computer security / Electronic commerce / Secure communication / Testbed / Computer network / United States Department of Homeland Security / Information Sciences Institute / Security / Public safety / National security

Communications of the ACM, 47:3, March 2004, pp[removed]By Members of the DETER and EMIST Projects

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:43:09
453Data security / Georgia Institute of Technology / Georgia Tech Library / McAfee VirusScan / Oregon Institute of Technology / Computing / Wi-Fi / Information security / Password / Security / ResNet / Computer security

page 4 Top 10 Tech Tips Safe Computing The OIT Information Security Department would like to welcome you to Georgia Tech and

Add to Reading List

Source URL: librarycommons.gatech.edu

Language: English - Date: 2008-10-01 20:07:11
454Computer network security / Data security / Software testing / SANS Institute / Penetration test / Consensus audit guidelines / Information technology security audit / Global Information Assurance Certification / Information technology audit / Computer security / Security / Cyberwarfare

Rocky Mountain 2013 Denver, CO • July 14-20, 2013

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-05-01 15:54:10
455Mass surveillance / National Security Agency / United States government secrecy / Carnegie Mellon University / Computer security / SRI International / Trustworthy computing / Institute for Information Infrastructure Protection / Security / National security / Surveillance

PDF Document

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:51:02
456United States Department of Homeland Security / Crime prevention / Cyberwarfare / National Cyber Security Division / Software Engineering Institute / Resilience / Business continuity / Information security / Computer security / Public safety / Security / National security

Cyber Resilience Review The Cyber Security Evaluation Program (CSEP), within the Department of Homeland Security’s (DHS) National Cyber Security Division (NCSD), conducts a no-cost, voluntary Cyber Resilience Review (

Add to Reading List

Source URL: thielst.typepad.com

Language: English - Date: 2012-06-04 11:52:45
457Cyberwarfare / National security / Crime prevention / Data security / SANS Institute / Advanced persistent threat / Information security / Penetration test / Network security / Security / Computer security / Computer network security

SANS CYBER DEFENSE SUMMIT[removed]Agenda All Summit Sessions will be held in the Capitol Ballroom (unless noted). All approved presentations will be available online following the Summit at https://files.sans.org/cyberdefe

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-08-18 09:27:17
458Security / Mass surveillance / National Security Agency / United States government secrecy / Georgia Tech Research Institute / Information assurance / United States Department of Defense / Information Assurance Technology Analysis Center / Computer security / Surveillance / National security

Mr. Jeff Moulton is the Director of Program Development and Information Operations. He provides strategic direction and leadership and is responsible for focusing research, business development, building technical tea

Add to Reading List

Source URL: www.afcea.org

Language: English - Date: 2012-11-26 11:07:26
459Cyberwarfare / Crime prevention / National security / Global Information Assurance Certification / SANS Institute / Penetration test / Application security / White hat / Network security / Computer network security / Security / Computer security

Security East 2013 January 16-23, 2013 THE MOST TRUSTED SOURCE FOR INFORMATION AND SOFTWARE SECURITY TRAINING Hands-on immersion training programs,

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2012-11-02 12:55:26
460Data / Computer network security / Trusted computing / Internet protocols / StrongSwan / Trusted Network Connect / IF-MAP / Trusted Computing Group / Internet Key Exchange / Computer security / Computing / Cryptographic protocols

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
UPDATE