Computer Security Institute

Results: 1676



#Item
891Cyberwarfare / National security / Analytics / Mathematical finance / Information security / Public safety / Institute for Information Infrastructure Protection / Business intelligence / Security / Computer security

FOR IMMEDIATE RELEASE Contact: Amy Pasquarello[removed]ext[removed]removed] FEDERAL AGENCIES WORK TO BALANCE THE CYBER

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2014-02-20 17:53:27
892Cyberwarfare / Crime prevention / National security / Electronic commerce / Wireless security / Vulnerability / Institute for Information Infrastructure Protection / Critical infrastructure protection / Computer security / Security / Computer network security

Microsoft Word - CSIIR-Wkshp-Theme2006.doc

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2006-03-23 11:37:20
893Computing / NIST Special Publication 800-53 / National Institute of Standards and Technology / Risk management framework / Security controls / ICS / Information security / Computer security / Data security / Security

Invitation to Attend: NIST Workshop on Applying NIST Special Publication[removed], Revision 1: Recommended Security Controls for Federal Information systems, to Industrial Control Systems. August[removed]PM) & August 17 (9

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
894NIST Special Publication 800-53 / Personally identifiable information / Security / Computer security / Government / Computing / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

PRIVACY IMPACT ASSESSMENT (PIA) National Institute of Standards and Technology NIST Laboratory Programs Project Description The mission of the NIST Laboratories is to develop technical standards for scientific

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2012-02-10 14:14:25
895Computing / National Institute of Standards and Technology / Risk analysis / Security controls / Standards for Security Categorization of Federal Information and Information Systems / Health Insurance Portability and Accountability Act / NIST Special Publication 800-53 / IT risk management / Computer security / Data security / Security

DATA MANAGEMENT PLAN GUIDELINES The data management plan guidelines contain four steps. You are being asked to describe the actions that you will take to address these protections specific to this research request. The

Add to Reading List

Source URL: www.resdac.org

Language: English - Date: 2013-01-28 11:18:23
896United States Department of Homeland Security / National Institute of Standards and Technology / Government / Public administration / Public safety / Computer law / Computer security / Federal Information Security Management Act

COMPUTER SYSTEM SECURITY AND

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-17 14:27:02
897Building engineering / Project manager / Computer security / 40G / Consensus audit guidelines / Scope / Business / Project management / Management / Global Information Assurance Certification

Implementing and Automating Critical Control 19: Secure Network Engineering for Next Generation Data Center Networks SANS Technology Institute

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:54
898Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
899Federal Information Security Management Act / Security Content Automation Protocol / National Institute of Standards and Technology / FIPS 140-2 / Institute for Information Infrastructure Protection / Security controls / Information Security Automation Program / Information security / Domain Name System Security Extensions / Computer security / Security / Computing

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 10:59:19
900National Institute of Standards and Technology / Statistics / Federal Information Processing Standard / Standards / American National Standards Institute / Information security / Public safety / Data security / Security / Computer security

Information Security Policy

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2014-06-16 12:37:43
UPDATE