Computer Security Institute

Results: 1676



#Item
791Academic publishing / Andrew W. Mellon Foundation / JSTOR / IP address / Massachusetts Institute of Technology / Firewall / Education / Publishing / Computer network security / Academia / Cyberwarfare

From /OITHAKA/OUFIRST GROIJP/CNRECIPIENT S/CN Sent

Add to Reading List

Source URL: docs.jstor.org

Language: English - Date: 2013-07-25 17:13:14
792Computing / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet Society / Open standard / Internet Engineering Task Force / CaBIG / Internet governance / Medicine / Internet

Annie Sokol National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930, Gaithersburg, MD[removed]By electronic mail: [removed] Response by the Internet Society to the

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 22:55:18
793Internet Engineering Task Force / Governance / American National Standards Institute / Computing / Political science / Technology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

COMMENTS ON NOTICE OF INQUIRY Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace 76 FR[removed]DOCUMENT NUMBER[removed]DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 09:44:42
794Human security / Security studies / Collective security / Computer security / Bangladesh Institute of Peace & Security Studies / Security / International security / International relations

SECOND HIGH-LEVEL MEETING ON THE OEA/Ser.K/XXIX SPECIAL SECURITY CONCERNS OF SMALL ISLAND STATES

Add to Reading List

Source URL: www.oas.org

Language: English - Date: 2006-03-22 17:41:59
795Computer network security / Crime prevention / National security / Data security / National Strategy for Trusted Identities in Cyberspace / Federal Information Security Management Act / Information security / International Multilateral Partnership Against Cyber Threats / National Institute of Standards and Technology / Security / Computer security / Public safety

NIST Roadmap for Improving Critical Infrastructure Cybersecurity, February 12, 2014

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-02-12 10:41:03
796Security / Quality management / IRIS / National Institute of Standards and Technology / Biometrics / Iris recognition / University of Cambridge Computer Laboratory

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2010-04-28 23:11:30
797Security / Quality management / IRIS / National Institute of Standards and Technology / National security / Biometrics / Iris recognition / University of Cambridge Computer Laboratory

Microsoft Word - IREXII_IQCE_conops_API_v3_28nov09.docx

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2009-12-02 09:53:52
798Computer security / Computing / Cyberwarfare / Access control / Identity management / X.509 / PERMIS / Authorization certificate / Public key certificate / Public-key cryptography / Security / Key management

Determining Privileges of Mobile Agents Wayne A. Jansen National Institute of Standards and Technology [removed] Abstract This paper describes a method for controlling the

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
799Government / American Association of State Colleges and Universities / Klamath Falls /  Oregon / Oregon Institute of Technology / National Telecommunications and Information Administration / Federal Information Security Management Act / Information technology management / Information security / National Security Agency / Security / Computer security / National security

DOC Document

Add to Reading List

Source URL: www.maine.gov

Language: English - Date: 2014-02-06 11:12:00
800Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE