Computer Security Institute

Results: 1676



#Item
821Computer network security / Electronic commerce / Secure communication / National security / Application security / Vulnerability / Institute of Electrical and Electronics Engineers / Security / Cyberwarfare / Computer security

AVOIDING THE TOP 10 SOFTWARE SECURITY DESIGN FLAWS Iván Arce, Kathleen Clark-Fisher, Neil Daswani, Jim DelGrosso, Danny Dhillon,

Add to Reading List

Source URL: cybersecurity.ieee.org

Language: English - Date: 2014-09-02 19:52:38
822International Traffic in Arms Regulations / Military technology / United States Department of Commerce / United States law / Computer security / Security / Crime prevention / Identifiers

INTERNATIONAL PROGRAMS SECURITY REQUIREMENTS COURSE (IPSRC) Sponsored by The Office of the Deputy Under Secretary of Defense (Policy Integration and Chief of Staff) (PI & CoS) and The Defense Institute of Security Assist

Add to Reading List

Source URL: www.disam.dsca.mil

Language: English - Date: 2014-07-30 10:59:39
823Computer security / Data security / Security / Chief information officer / National Institute of Standards and Technology / Purchasing / Information security / Business / Technology / Management

Microsoft Word - 2012_IT_Annual_Report_FINAL_Jan_2012_ver120131

Add to Reading List

Source URL: tgb.iowa.gov

Language: English - Date: 2013-02-19 14:55:32
824Public safety / Computing / Computer law / Federal Information Security Management Act / National Institute of Standards and Technology / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service / Computer security / Security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2013-11-18 16:51:47
825Security / Government / National Institute of Standards and Technology / Federal assistance in the United States / Presidency of Lyndon B. Johnson / Federal Information Security Management Act / Medicaid / Health Insurance Portability and Accountability Act / Federal Information Processing Standard / Computer security / Healthcare reform in the United States / Law

Response to Questions and Member Requests for the Record October 09, 2013 W. Brett Graham, Partner & Managing Director, Leavitt Partners Hearing on PPACA Pulse Check: Part 2 United States House of Representatives Committ

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-11-12 16:24:12
826Multi-agent systems / Antivirus software / Software / Malware / Spamming / Computer virus / Leap / Botnet / Computer security / Computer network security / Computing / System software

Software Distribution Malware Infection Vector Felix Gr¨obert, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security Ruhr-Universit¨at Bochum dia player VLC1 .Typical protection mechanisms such as

Add to Reading List

Source URL: dl.packetstormsecurity.net

Language: English - Date: 2008-07-18 17:30:01
827Government / National security / Education in the United States / Social Security / Virginia Military Institute / Computer security / FAFSA / Taxation in the United States / Security / Crime prevention

Social Secur ity number disclosure waiver The undersigned applicant/student has been advised that provision of a Social Security number is voluntary and of the purposes for which the number may be used if provided. Pleas

Add to Reading List

Source URL: admissions.vmi.edu

Language: English - Date: 2013-06-12 16:38:08
828Data security / Risk / Australian Information Industry Association / Cloud computing / Australian Institute of International Affairs / ISO 31000 / Information security / ISO/IEC 27001 / Security / Computing / Computer security

GPO Box 573 Canberra ACT 2601 Ground Suite B 7-11 Barry Drive Turner ACT[removed]July 2014

Add to Reading List

Source URL: c.ymcdn.com

Language: English - Date: 2014-07-30 01:14:27
829United States Department of Homeland Security / Carnegie Mellon University / Software Engineering Institute / Idaho National Laboratory / Critical infrastructure protection / Computer security / Smart grid / Office of Electricity Delivery and Energy Reliability / Capability Maturity Model / National security / Security / Software development

Department of Homeland Security (2955)

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2012-06-01 12:20:00
830Supply chain management / Security / Computer security / Actuarial science / Supply chain risk management / Supply chain / Risk management / Information security / National Institute of Standards and Technology / Management / Business / Technology

ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-04 17:45:53
UPDATE