Computer Security Institute

Results: 1676



#Item
711Carnegie Mellon University / Computer network security / United States Department of Homeland Security / Internet governance / Cyber Insider Threat / United States Computer Emergency Readiness Team / Software Engineering Institute / Critical infrastructure protection / CERT Coordination Center / Computer security / Security / Cyberwarfare

Microsoft Word - Banking and Finance Report.8-20a-FINAL.doc

Add to Reading List

Source URL: www.secretservice.gov.

Language: English - Date: 2004-08-20 12:20:00
712Multi-agent systems / Spamming / Computing / Computer crimes / Institute for Information Infrastructure Protection / Cyberwarfare / Botnet / International Multilateral Partnership Against Cyber Threats / Computer network security / Cybercrime / Computer security

I3P Institute for Information Infrastructure Protection Winter 2009

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:28
713Computer security / Industrial automation / SCADA / Telemetry / Crime prevention / National security / Cyberwarfare / Vulnerability / Security / Technology / Hacking

Critical Infrastructure: Security Preparedness and Maturity Sponsored by Unisys Independently conducted by Ponemon Institute LLC Publication Date: July 2014

Add to Reading List

Source URL: www.hunton.com

Language: English - Date: 2014-07-29 14:09:01
714Public safety / Emerging technologies / Security engineering / Institute for Information Infrastructure Protection / Cyberwarfare / Smart grid / Critical infrastructure protection / Computer security / Cyber-security regulation / National security / Security / United States Department of Homeland Security

I3P Institute for Information Infrastructure Protection Volume 2, Issue 3

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:35
715Computer network security / Central processing unit / Threads / Microprocessors / Parallel computing / Network processor / Multithreading / Simultaneous multithreading / Multi-core processor / Computing / Computer hardware / Computer architecture

An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention Vern Paxson International Computer Science Institute Lawrence Berkeley National Laboratory [removed]

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-04-24 13:31:19
716Risk / National Institute of Standards and Technology / Crime prevention / NIST Special Publication 800-53 / Federal Information Security Management Act / Security controls / Information security / Standards for Security Categorization of Federal Information and Information Systems / Vulnerability / Computer security / Security / Data security

Memorandum for Record: Security Controls Assessment Form In the FY 2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, OMB stated that for fiscal year (FY) 2007

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-26 01:00:00
717American National Standards Institute / Cyberwarfare / Computer security / BAE Systems / Transglobal Secure Collaboration Project / Security / Corporate Ink / Standards organizations

TSCP France release[removed]FINAL

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-09-16 22:07:55
718Crimes / Fraud / Social issues / Identity theft / Identity fraud / Credit card fraud / Organized crime / Authentication / Computer crime / Security / Ethics / Identity

Identity Fraud: A Critical National and Global Threat A Joint Project of the Economic Crime Institute of Utica College and LexisNexis, a Division of Reed Elsevier Inc. October 28, 2003

Add to Reading List

Source URL: www.utica.edu

Language: English - Date: 2005-12-21 11:07:35
719Institute for Information Infrastructure Protection / Computer security / Cloud computing / United States Computer Emergency Readiness Team / National Security Agency / Security / Computing / National security

I3P Institute for Information Infrastructure Protection Volume 3, Issue 3

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:35
720Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-03-06 12:33:10
UPDATE