Computer Security Institute

Results: 1676



#Item
601Cyberwarfare / Information security / Risk management framework / Security controls / Vulnerability / Risk management / National Institute of Standards and Technology / IT risk management / Federal Information Security Management Act / Computer security / Security / Data security

Ongoing Authorization Transitioning to Near Real-Time Risk Management August 19, 2014 Kelley Dempsey

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-20 13:05:08
602Gaithersburg /  Maryland / National Institute of Standards and Technology / Calibration / Joint Quantum Institute / Certified reference materials / Metrology / Measurement / Standards

The Computer Security Division Measurement Science for IT IT for Measurement Science

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-20 12:56:57
603Cyberwarfare / Federal Information Security Management Act / Security Content Automation Protocol / Configuration management / Information security / Security controls / National Institute of Standards and Technology / Vulnerability / Chief information security officer / Computer security / Security / Computing

U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C[removed]DEPARTMENTAL REGULATION Number:

Add to Reading List

Source URL: www.ocio.usda.gov

Language: English - Date: 2014-08-14 11:00:16
604Identity / Law enforcement / Organized crime / Australian Crime Commission / Identity document / Identity management / Computer crime / Australian Institute of Criminology / Police / Crime / Security / Law

Improving the Measurement of Identity Crime and Misuse in Australia: Recommendations from the National Identity Crime and Misuse Measurement Framework Project

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2014-12-10 18:06:45
605Smartphone / Computer security / Public safety / Malware / Computer network security / Security

2014 State of Endpoint Risk Sponsored by Lumension® Independently conducted by Ponemon Institute LLC Publication Date: December 2013

Add to Reading List

Source URL: www.lumension.com

Language: English - Date: 2013-12-13 12:29:16
606Computer security / Information technology management / Risk analysis / Public administration / Security / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

Update on the Development of the Cybersecurity Framework, (January 15, 2014)

Add to Reading List

Source URL: nocinfragard.org

Language: English - Date: 2014-01-23 13:16:02
607Object-oriented programming / Method / PHP / Prototype-based programming / JavaScript / Object / Serialization / Vulnerability / Inheritance / Software engineering / Computing / Computer programming

Code Reuse Attacks in PHP: Automated POP Chain Generation Johannes Dahse, Nikolai Krein, and Thorsten Holz Horst Görtz Institute for IT-Security (HGI) Ruhr-University Bochum, Germany

Add to Reading List

Source URL: syssec.rub.de

Language: English - Date: 2014-09-10 11:24:27
608Crime prevention / Security guard / Critical infrastructure / Public security / United States Department of Homeland Security / Homeland security / Information security / Computer security / Academi / Security / Public safety / National security

BIGS Policy Paper Brandenburg Institute for Society and Security BRANDENBURGISCHES INSTITUT für GESELLSCHAFT und SICHERHEIT

Add to Reading List

Source URL: www.bigs-potsdam.org

Language: English - Date: 2014-08-22 05:58:58
609Risk management / Actuarial science / Evaluation / Reliability engineering / Risk assessment / Safety engineering / Vulnerability / Computer security / United Nations Interregional Crime and Justice Research Institute / Risk / Security / Management

Risk Benefit Assessment Worksheet Part of National and Transnational Security Implications of Big Data in the Life Sciences, A Joint AAAS-FBI-UNICRI Project Technology [scenario/outcome] Adversary

Add to Reading List

Source URL: www.aaas.org

Language: English - Date: 2014-11-10 17:07:30
610Ethics / Security / Actuarial science / Computer security / Risk assessment / Audit / Internal audit / Security risk / Vulnerability / Management / Risk / Risk management

The Institute of Internal Auditors Ottawa Chapter Lunch and Learn November 20, 2013 The Threat and Risk Assessment (TRA)

Add to Reading List

Source URL: chapters.theiia.org

Language: English - Date: 2013-12-05 14:55:30
UPDATE