Computer Security Institute

Results: 1676



#Item
81Cyberwarfare / Standards organizations / National Institute of Standards and Technology / EO Personal Communicator / Computer security / NIST Cybersecurity Framework / Abramowitz and Stegun / Email

ITF Bulletin 25 November and 2 December 2013

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2013-12-09 17:52:23
82

Practical Static Analysis for Inference of Security-Related Program Properties Yin Liu Department of Computer Science Rensselaer Polytechnic Institute

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2009-02-08 00:54:20
    83Computing / Computer access control / Computer security / Cloud standards / Identity management / Identity management systems / Federated identity / OAuth / User-Managed Access / XACML / OpenID Connect / OpenID

    Securing Integration of Cloud Services in Cross-Domain Distributed Environments Bojan Suzic Institute for Applied Information Processing and Communications Graz, Austria

    Add to Reading List

    Source URL: demo.a-sit.at

    Language: English - Date: 2016-04-19 05:19:12
    84Security / Crime prevention / Cryptography / National security / Information governance / Computer security / Information security / Password / Paul Dourish / Internet privacy / Security hacker / Outline of computer security

    Institute for Software Research University of California, Irvine Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem

    Add to Reading List

    Source URL: www.dourish.com

    Language: English - Date: 2008-06-14 12:49:22
    85Software / Computer architecture / System software / Linux kernel / Computing platforms / Patch / Xen / Dynamic software updating / Hypervisor / NetBSD / Security-Enhanced Linux / Loadable kernel module

    Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

    Add to Reading List

    Source URL: ipads.se.sjtu.edu.cn

    Language: English - Date: 2012-01-05 23:25:04
    86Computer security / Cybercrime / National security / Cyberwarfare / Computer network security / Threat / Cyberterrorism / Information security / Cyber-Insurance / Institute for Information Infrastructure Protection

    Microsoft PowerPoint - SkillBridge Capabilities Statement

    Add to Reading List

    Source URL: www.skillbridgetraining.com

    Language: English - Date: 2015-05-01 14:08:59
    87Security / Prevention / Cyberwarfare / Computer security / National security / Computer network security / Crime prevention / Cryptography / Threat / Cyber threat intelligence / Cyber-attack / Information security

    The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

    Add to Reading List

    Source URL: webroot-cms-cdn.s3.amazonaws.com

    Language: English - Date: 2016-02-25 11:51:52
    88Security / Human resource management / Economy / Risk / Chartered Institute of Personnel and Development / Crisis management / Computer security

    Five business timebombs that could derail your organisation Source: http://www.cipd.co.uk/pm/peoplemanagement/b/weblog/archivefive-business-timebombs-that-couldderail-your-organisation.aspx Jeremy Hazlehurst

    Add to Reading List

    Source URL: miscodirectors.com

    Language: English - Date: 2016-03-05 01:46:44
    89Computing / Software / Cyberspace / Spamming / Social networking services / Computer network security / Cybercrime / E-commerce / Twitter / Vulnerability / Computer security / Botnet

    A Categorization Scheme for Socialbot Attacks In Online Social Networks Silvia Mitter Knowledge Technologies Institute Graz University of Technology, Austria

    Add to Reading List

    Source URL: claudiawagner.info

    Language: English - Date: 2013-08-25 09:03:46
    90Prevention / Security / Computer security / Data security / Cryptography / National security / Federal Information Security Management Act / Risk management framework / Information security / National Institute of Standards and Technology / Application security / Systems engineering

    Microsoft Word - SPspd-final

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-05-03 23:25:26
    UPDATE