Computer Security Institute

Results: 1676



#Item
521Computing / Software testing / Cryptography / Hacking / SANS Institute / Penetration test / Global Information Assurance Certification / Certified Information Systems Security Professional / White hat / Computer security / Computer network security / Security

T he M o st T r u sted N ame in I nf o rmati o n and S o ftware S ec u rit y T rainin g Boston 2013 August 5-10, 2013

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-05-17 15:57:04
522Cyberwarfare / Cloud computing / Information technology security audit / Institute of Electrical and Electronics Engineers / Computer security / Vulnerability / Security / Computing / Auditing

2013 Cloud Security Auditing Workshop with SERVICES 2013

Add to Reading List

Source URL: www.seat.utulsa.edu

Language: English - Date: 2014-03-16 14:08:31
523Cyberwarfare / Global Information Assurance Certification / Software testing / SANS Institute / Web application security / Programmer / Software engineering / Application security / Vulnerability / Computer security / Computing / Computer network security

SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and largest source for information security training and certification in the world. SANS teach

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
524Computer security / Middleware / Software engineering / Computer network security / SANS Institute / Security

Education leaders unite: K.U.Leuven DistriNet and SANS to cooperate on security education -- First European partner for secure programming initiative of SANS. Leuven, Belgium – 6 May, 2008 – DistriNet, the security r

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
525Malware / Computer forensics / Computer security / Global Information Assurance Certification / SANS Institute

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-11-20 16:15:59
526Computing / Global Information Assurance Certification / Penetration test / White hat / SANS Institute / Computer security / Hacking / Computer network security

Penetration Testing & Ethical Hacking Graduate Certificate The SANS Technology Institute’s post-baccalaureate certificate program in Penetration Testing & Ethical Hacking is based entirely upon four courses already ava

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-03-27 18:16:16
527Global Information Assurance Certification / Software / SANS Institute / Penetration test / Snort / Microsoft Security Essentials / Computer security / Computer network security / Computing

The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2014-03-27 18:16:16
528Smartphones / Malware / Industrial design / Computer security / Macintosh / Computer network security / Computing / Security

2015 State of the Endpoint Report: User-Centric Risk Sponsored by Lumension Independently conducted by Ponemon Institute LLC Publication Date: January 2015

Add to Reading List

Source URL: www.lumension.com

Language: English - Date: 2015-01-22 16:51:30
529Computing / National Institute of Standards and Technology / FIPS 140-2 / Federal Information Security Management Act / Cryptographic Module Validation Program / NSA Suite B Cryptography / FIPS 140 / Information security / FIPS 140-3 / Cryptography standards / Security / Computer security

Summary of Public Comments on NISTIR[removed]Feb[removed]First) Draft) Based on the draft February 2014 National Institute of Standards and Technology (NIST) publication describing the principles and processes for its work o

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-23 13:36:35
530Cyberwarfare / Computer network security / Crime prevention / National security / National Institute of Standards and Technology / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / National Cybersecurity Center / National Strategy for Trusted Identities in Cyberspace / Security / Computer security / Computing

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-27 16:21:14
UPDATE