Computer Security Institute

Results: 1676



#Item
761Computer emergency response team / Lance Hoffman / Information assurance / Cyberwarfare / Cyber security and countermeasure / Howard Schmidt / Security / Computer security / Institute for Information Infrastructure Protection

I3P Institute for Information Infrastructure Protection Fall 2012

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:34
762Computer network security / United States Department of Homeland Security / Carnegie Mellon University / Hacking / Cyber Insider Threat / Software Engineering Institute / Critical infrastructure protection / Insider / United States Computer Emergency Readiness Team / Security / National security / Computer security

Microsoft Word - final IT sector[removed]doc

Add to Reading List

Source URL: www.secretservice.gov.

Language: English - Date: 2008-01-10 05:28:16
763Computing / Intrusion detection system / Mobile agent / Software agent / Denial-of-service attack / AAFID / Intrusion detection system evasion techniques / Computer network security / Computer security / Cyberwarfare

INTRUSION DETECTION WITH MOBILE AGENTS Wayne A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 (+[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
764Academic publishing / Andrew W. Mellon Foundation / JSTOR / Massachusetts Institute of Technology / Firewall / Education / Publishing / Computer network security / Academia / Cyberwarfare

From /OITHAKA/OUFIRST GROUP/CNRECIPIENTS/CN Sent

Add to Reading List

Source URL: docs.jstor.org

Language: English - Date: 2013-07-25 17:13:14
765Cryptography / Distributed computing architecture / Mobile agent / Software agent / Agent-based model / Aglets / Trusted Computing / Threat / Computer security / Computing / Multi-agent systems / Computer network security

Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
766National Institute of Standards and Technology / Computing / Computer network security / Security controls / NIST Special Publication 800-53 / Information security / Standards for Security Categorization of Federal Information and Information Systems / Internet privacy / Personally identifiable information / Computer security / Security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT O F F I C E O F M AN AG E M E N T AN D B U D G E T W ASHINGTON, D.C[removed]June 23, 2006 M-06-16

Add to Reading List

Source URL: hr.od.nih.gov

Language: English - Date: 2013-09-11 12:36:24
767Government / National Institute of Standards and Technology / Ethics / Computer law / Federal Information Security Management Act / Privacy law / NIST Special Publication 800-53 / OMB Circular A-130 / Personally identifiable information / Security / Computer security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]DEPUTY DIRECTOR FOR MANAGEMENT

Add to Reading List

Source URL: hr.od.nih.gov

Language: English - Date: 2013-09-11 12:36:59
768Computer network security / National Strategy for Trusted Identities in Cyberspace / Stakeholder

July 22, 2011 National Institute of Standards & Technology c/o Annie Sokol 100 Bureau Drive Mailstop 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 19:20:38
769Security / Quality management / National Institute of Standards and Technology / IRIS / National security / Biometrics / Iris recognition / University of Cambridge Computer Laboratory

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-01-12 15:26:04
770Iris recognition / University of Cambridge Computer Laboratory / Surveillance / Privacy / Quality management / Multiple Biometric Grand Challenge / Iris / National Institute of Standards and Technology / Image file formats / Biometrics / Face recognition / Security

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2009-10-16 10:39:19
UPDATE