Computer Security Institute

Results: 1676



#Item
51Algebra / Mathematics / Polynomials / Computer algebra / Abstract algebra / Irreducible polynomial / Polynomial / Finite fields / Polynomial decomposition / Finite field arithmetic

MINISTRY OF EDUCATION AND SCIENCE OF THE REPUBLIC OF KAZAKHSTAN COMMITTEE OF SCIENCE INSTITUTE OF INFORMATION AND COMPUTATIONAL TECHNOLOGIES Information Security Laboratory

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:36:00
52Computer security / Computing / Business continuity and disaster recovery / Security / Cyberwarfare / IT risk management / Backup / Data management / National Institute of Standards and Technology / Business continuity planning / Disaster recovery / Business continuity

1 Draft NIST Special Publication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-06 12:06:37
53Education / Security / Computing / Systems engineering / Computer security / Educational technology / Integrated logistics support / Parallel running

TRANSFER OF HIGH TECHNOLOGY TO DEVELOPING COUNTRIES Jane Drummond and Pavao Stefanovic International Institute for Aerospace Survey and Earth Sciences SUMMARY: This paper reviews, on the basis of objectives and constrain

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:30:42
54Lightning / Lightning strike / Safety / Vulnerability / Computer security / Cyberwarfare / Electrical safety / Risk

Introduction Letter TO WHOM IT MAY CONCERN The purpose of this letter is to introduce to you our company the National Lightning Safety Institute (NLSI). Our focus is Risk Management of the lightning hazard.

Add to Reading List

Source URL: lightningsafety.com

Language: English - Date: 2014-12-02 20:52:43
55Privacy / Internet privacy / Data security / Computing / Computer security / HTTP cookie / Information privacy / Personally identifiable information

gaiagosa.eu User Agreement Summary The GOSA is a citizen science project created by the Institute Astronomical Observatory of the

Add to Reading List

Source URL: www.gaiagosa.eu

Language: English - Date: 2015-06-26 01:43:04
56Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
57Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
58Software / Computing / Cyberwarfare / Computer network security / Internet Standards / Multi-agent systems / Spamming / Transmission Control Protocol / Skype / Botnet / Transport Layer Security / Network packet

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Add to Reading List

Source URL: mkorczynski.com

Language: English - Date: 2015-02-15 17:10:50
59Computer access control / Identity management / End user / Password / Prevention / Computer security / Contract law

End User License Agreement for the Coordinate Transformation Service of the Finnish Geodetic Institute 1 General

Add to Reading List

Source URL: coordtrans.fgi.fi

Language: English - Date: 2014-04-25 09:22:20
60Software / Computing / Security / Cybercrime / Cyberwarfare / First Amendment to the United States Constitution / Computer network security / Computer security / Cryptography / Internet censorship / Facebook / Freedom of speech in the United States

Microsoft WordMedia Institute Luncheon Remarks - APPROVED.docx

Add to Reading List

Source URL: www.mediainstitute.org

Language: English - Date: 2016-04-13 15:41:25
UPDATE