Computer Security Institute

Results: 1676



#Item
41Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
42Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
43Cyberwarfare / Computer security / Security / Computing / Cyber security standards / National Institute of Standards and Technology / Federal Information Security Management Act / Federal Information Processing Standards / National Cybersecurity Center of Excellence / Networking and Information Technology Research and Development

CYBERSECURITY ACTIVITIES AT NIST’S INFORMATION TECHNOLOGY LABORATORY HEARING BEFORE THE SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2016-05-06 11:29:44
44Security / Norbert Pohlmann / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet security / Gelsenkirchen

The next step in IT security after Snowden Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is)

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-10 07:43:45
45Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:17:50
46Emergency management / Incident management / Disaster preparedness / Firefighting in the United States / Ministry of Home Affairs / Management / National Institute of Disaster Management / Incident Command System / Incident commander / Computer security incident management

Microsoft Word - 12-ic rt unit 2c

Add to Reading List

Source URL: nidm.gov.in

Language: English - Date: 2015-09-14 05:29:59
47Computer security / Security / Prevention / Data security / National Institute of Standards and Technology / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Controlled Unclassified Information / NIST Cybersecurity Framework / Regulatory compliance / Information security

An Introduction to NIST Special Publicationfor Higher Education Institutions

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-18 11:38:08
48Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
49Security / International relations / Cyberwarfare / Cybercrime / National security / EastWest Institute / International security / Computer security

  ISSUE  1      

Add to Reading List

Source URL: iisi.msu.ru

Language: English - Date: 2013-09-27 05:26:04
50Computational linguistics / Linguistics / Applied linguistics / Computer security / Cryptography / Word-sense disambiguation / Password / Security / Part-of-speech tagging / WordNet / Natural language processing / Dictionary attack

On the Semantic Patterns of Passwords and their Security Impact Rafael Veras, Christopher Collins, and Julie Thorpe University of Ontario Institute of Technology Ontario, Canada {rafael.verasguimaraes, christopher.collin

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
UPDATE