Computer Security Institute

Results: 1676



#Item
511Computing / Computer network security / Security controls / National Institute of Standards and Technology / Unemployment benefits / Information Technology Security Assessment / NIST Special Publication 800-53 / Federal Information Security Management Act / Computer security / Data security / Security

Microsoft Word - UIPL SEC[removed]Chg3.doc

Add to Reading List

Source URL: wdr.doleta.gov

Language: English - Date: 2009-03-06 15:02:05
512Theft / Government / Identity theft / Fraud / Computer network security / Identity fraud / Red Flags Rule / Data breach / Personally identifiable information / Identity / Security / Crimes

Prevent Identity Theft in the Face of Growing Data Breach Incidents Data breach incidents result in increased cases of identity theft. Identity Management Institute recommends 5 areas of business focus for identity theft

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-07-17 09:52:29
513Logic gates / Computational complexity theory / Circuit complexity / Boolean circuit / Logic in computer science / Adder / ACC0 / OR gate / Theoretical computer science / Applied mathematics / Digital circuits

Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification Ahmad-Reza Sadeghi and Thomas Schneider? Horst G¨ ortz Institute for IT-Security, Ruhr-University Bochum,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-22 15:22:51
514Cyberwarfare / Data security / Crime prevention / National security / Security controls / SANS Institute / Vulnerability / Computer security / Security / Computer network security

The Critical Security Controls International Summit strives to bring you the most up-to-date thinking on the hottest topics. As a result, the agenda is dynamic and subject to change. Please check back for updates. 8:00 a

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-03-08 11:28:05
515Data security / National security / Government / Information security / Computer Security Act / National Institute of Standards and Technology / Managed Trusted Internet Protocol Service / Federal Information Security Management Act / Computer security / Security / Computer law

15 USC 278g-3 NB: This unofficial compilation of the U.S. Code is current as of Jan. 4, 2012 (see http://www.law.cornell.edu/uscode/uscprint.html). TITLE 15 - COMMERCE AND TRADE CHAPTER 7 - NATIONAL INSTITUTE OF STANDARD

Add to Reading List

Source URL: www.law.cornell.edu

Language: English - Date: 2013-07-17 17:56:42
516Cyberwarfare / Data security / Crime prevention / National security / Security controls / SANS Institute / Vulnerability / Computer security / Security / Computer network security

The Critical Security Controls International Summit strives to bring you the most up-to-date thinking on the hottest topics. As a result, the agenda is dynamic and subject to change. Please check back for updates. 8:00 a

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-03-08 11:28:05
517Computer network security / United States Department of Homeland Security / Computer security / Security engineering / Critical infrastructure protection / Attack / Institute for Information Infrastructure Protection / Department of Defense Strategy for Operating in Cyberspace / Security / National security / Cyberwarfare

GAO-04-140T Highlights, Critical Infrastructure Protection: Challenges in Securing Control Systems

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 20:46:27
518Military technology / Computer network security / Cyberwarfare / Computer security / Malware / War / Security / Electronic warfare / Hacking

The Risk of an Uncertain Security Strategy Study of Global IT Practitioners in SMB Organizations Sponsored by Sophos Independently conducted by Ponemon Institute LLC Publication Date: November 2013

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2013-11-18 17:11:48
519Department of Defense Strategy for Operating in Cyberspace / National security / Electronic warfare / Hacking / Military technology / Military / United States Cyber Command / U.S. Department of Defense Strategy for Operating in Cyberspace / Military science / Cyberwarfare / Computer crimes

Executive Summary Strategic Studies Institute and U.S. Army War College Press AN ASSESSMENT OF THE DEPARTMENT OF DEFENSE STRATEGY FOR OPERATING IN CYBERSPACE

Add to Reading List

Source URL: strategicstudiesinstitute.army.mil

Language: English - Date: 2013-09-23 11:12:24
520United States Department of Energy National Laboratories / Idaho / Carnegie Mellon University / International Multilateral Partnership Against Cyber Threats / Institute for Information Infrastructure Protection / Computer security / Research / Geography of the United States / Security / Battelle Memorial Institute / Idaho National Laboratory

agile research for cybersecurity A New Approach Securing information systems from attack and compromise is a global problem of massive scope and scale. Cybersecurity can benefit from fundamental research that extends our

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-08-21 12:15:19
UPDATE