Computer Security Institute

Results: 1676



#Item
461Malware / Internet ethics / Email / Computer network security / Privacy-invasive software / Spyware / Internet privacy / Adware / Spam / Internet / Espionage / Computing

Blekinge Institute of Technology Licentiate Series No 2004:11 ISSN[removed]ISBN[removed]X Exploring Privacy Risks

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2012-09-18 08:24:24
462National security / Battelle Memorial Institute / United States Department of Energy National Laboratories / Computer network security / United States Department of Energy / Security guard / Computer security / Pacific Northwest National Laboratory / Information security / Security / Crime prevention / Public safety

Safeguards and Security Funding Profile by Subprogram (dollars in thousands) FY 2004 Comparable Appropriation

Add to Reading List

Source URL: science.energy.gov

Language: English - Date: 2011-01-10 08:37:40
463Public safety / Computer network security / Secure communication / National security / Insurance / Cyberwarfare / Data breach / Information security / Risk management / Security / Data security / Computer security

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian® Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

Add to Reading List

Source URL: assets.fiercemarkets.com

Language: English - Date: 2013-08-08 09:45:52
464Systems theory / Electric power transmission systems / Cybernetics / Development / Infrastructure / Electric power system / Computer security / System / Electrical grid / Security / National security / Electromagnetism

DECISION TECHNOLOGIES FOR PROTECTION OF CRITICAL INFRASTRUCTURES Earl E. Lee, II 1 Department of Decision Sciences and Engineering Systems Rensselaer Polytechnic Institute CII 5107, 110 Eighth St.

Add to Reading List

Source URL: eaton.math.rpi.edu

Language: English - Date: 2005-05-06 10:59:45
465Penetration test / Hong Kong media / Computer security / SANS Institute / Global Information Assurance Certification

7x11 card Program Guide Insert

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-06-03 16:27:36
466International Telecommunication Union / Computer security / Trustworthy computing / Technology / Smart grid / Institute for Information Infrastructure Protection / Security / Computer crimes / International Multilateral Partnership Against Cyber Threats

Notes for White House 60-day Cyber-Policy Review

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-06-28 17:44:04
467Crime prevention / Public safety / National Institute of Standards and Technology / Federal Information Security Management Act / Information security / National Security Agency / Security / Computer security / National security

United States House of Representatives

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-10-24 15:12:08
468Dependability / Quality / Safety engineering / Computer security / Ubiquitous computing / Real-time computing / Embedded system / Advanced Learning and Research Institute / William C. Carter Award / Security / Prevention / Safety

IEEE TRANSACTIONS ON Dependable and Secure Computing IEEE Transactions on Dependable and Secure Computing (TDSC) is a bimonthly journal that publishes archival research results focusing on research into foundations, met

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2012-09-04 17:37:01
469Public safety / Ethics / Cryptography / Malware / Computer security / Security engineering / Internet privacy / Privacy / Information security / Security / Crime prevention / National security

Research Institute for Security in the Information Society RISIS «IT Security is a prerequisite for the sustainable development of the information society.» Prof. Dr. Eric Dubuis, Head of RISIS

Add to Reading List

Source URL: www.forschung.ti.bfh.ch

Language: English - Date: 2014-10-06 03:12:33
470Surveillance / Identification / Hand geometry / Smart card / Biometrics Institute / Biometric points / Security / Biometrics / National security

Biometrics – How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany [removed]

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2008-09-22 07:43:54
UPDATE