Computer Security Institute

Results: 1676



#Item
471Principle of least privilege / Trusted computing base / Ring / Institute of Electrical and Electronics Engineers / Privilege / Computing / Security / Computer security / Information theory

Least Privilege Least Privilege and More With new methods for enforcing security policies comes the opportunity to formulate application-specific policies. But

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 11:09:48
472Computer network security / Spamming / Social engineering / Cybercrime / Malware / Botnet / Trojan horse / Carnegie Mellon University / Software Engineering Institute / Computing / Internet / Cyberwarfare

Artifact Analysis R&D September 5, 2005 © 2005 by Carnegie Mellon University Internet Security

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:54
473Idaho / Idaho National Laboratory / Computer security / International Multilateral Partnership Against Cyber Threats / Engineering / Computer crimes / Security / Institute of Electrical and Electronics Engineers

From the Editors Cybersecurity Education in Universities A

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:21:11
474National security / Computer Security Institute / Security guard / Information security / Security / Crime prevention / Public safety

2006FBIsurveycover10_q5SP.qxd

Add to Reading List

Source URL: i.cmpnet.com

Language: English - Date: 2006-07-27 11:39:23
475Internet / Cyberwarfare / Internet standards / Network performance / Data security / Firewall / Packet loss / Transmission Control Protocol / Denial-of-service attack / Computer network security / Computing / Network architecture

Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Mark Handley and Vern Paxson AT&T Center for Internet Research at ICSI (ACIRI) International Computer Science Institute Berke

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2001-05-27 00:48:06
476Computer security / Public safety / Cyberwarfare / Trustworthy computing / Information security / Cyber-security regulation / Institute for Information Infrastructure Protection / Security / National security / Crime prevention

United States House of Representatives House Armed Services Committee Terrorism and Unconventional Threats and Capabilities Subcommittee Hearing on: Private Sector Perspectives on Department of Defense

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2010-02-27 18:39:18
477Military technology / Cyberwarfare / Military science / Trustworthy computing / Computer security / Cyber-security regulation / Institute for Information Infrastructure Protection / Security / Electronic warfare / Hacking

Microsoft Word - Scheider-final-testimony June[removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2009-06-28 17:51:56
478Crime prevention / National security / Public safety / Computer network security / Information security / Oregon Institute of Technology / Chief information officer / Computer security incident management / Security / Computer security / Data security

Information Technology Incident Response Policy POLICY 7.2 Responsible Executive:

Add to Reading List

Source URL: policy.nd.edu

Language: English - Date: 2015-02-10 12:25:16
479Mobile technology / European Telecommunications Standards Institute / Computer network security / Digital rights management / IP Multimedia Subsystem / GPRS Tunnelling Protocol / RADIUS / Computer security / Technology / Electronic engineering / Computing

GS NFV-SEC[removed]V1[removed]Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2015-01-13 05:30:08
480Crime prevention / Computer network security / Computer security / Electronic commerce / Public safety / Institute for Information Infrastructure Protection / Cyber-security regulation / Cyberwarfare / Security / National security

Combatting Cyber Security Risks The Cyber Wellness Check CYBER SECURITY: “A SERIOUS NATIONAL THREAT” Risk Control Strategies

Add to Reading List

Source URL: www.alliancesecuritycouncil.com

Language: English - Date: 2013-07-10 14:53:56
UPDATE