Computer Security Institute

Results: 1676



#Item
921Internet protocol suite / Computer network security / Computing / Technology / Wireless networking / Research / Battelle Memorial Institute / Manhattan Project / Oak Ridge National Laboratory

ORNL Neutron Scattering School J u n e O a k R i d g e O a k

Add to Reading List

Source URL: neutrons.ornl.gov

Language: English - Date: 2010-05-07 15:18:38
922United States Department of Homeland Security / Counter-terrorism / Crime prevention / Computer Assisted Passenger Prescreening System / Lockheed Martin / Transportation Security Administration / Passenger name record / Privacy Act / Privacy Office of the U.S. Department of Homeland Security / Security / Aviation security / Public safety

Federal Register / Vol. 68, No[removed]Friday, August 1, [removed]Notices GLPAC will meet at the Maritime Institute of Technology Training and Conference Center, 5700 Hammonds Ferry Road, Linthicum Heights, MD 21090, in Roo

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2010-12-01 12:58:49
923Computing / Gaithersburg /  Maryland / National Institute of Standards and Technology / NIST Special Publication 800-53 / Security controls / Personally identifiable information / Computer security / Data security / Security

SUMMARY PRIVACY IMPACT ASSESSMENT (PIA) National Institute of Standards and Technology

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2012-02-10 14:15:22
924National security / Computer Security Institute / Computer security / Information security / Security guard / Federal Bureau of Investigation / Security / Crime prevention / Public safety

NINTH ANNUAL[removed]CSI/FBI COMPUTER CRIME

Add to Reading List

Source URL: i.cmpnet.com

Language: English - Date: 2004-08-20 16:04:43
925NIST Special Publication 800-53 / Personally identifiable information / Security / Computer security / Government / Computing / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

PRIVACY IMPACT ASSESSMENT (PIA) National Institute of Standards and Technology

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2012-02-10 14:13:13
926Government / National Institute of Standards and Technology / Ethics / Computer law / Federal Information Security Management Act / Privacy law / NIST Special Publication 800-53 / OMB Circular A-130 / Personally identifiable information / Security / Computer security / Data security

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C[removed]DEPUTY DIRECTOR FOR MANAGEMENT

Add to Reading List

Source URL: www.dod.mil

Language: English - Date: 2007-12-18 09:56:30
927Crime prevention / National security / Government / Computer crimes / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / United States Department of Homeland Security / National Institute of Standards and Technology / Security / Computer security / Public safety

Testimony of Charles H. Romine Director, Information Technology Laboratory National Institute of Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-07-18 12:04:05
928Technology / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Interoperability / Technology roadmap / Information technology management / NIST Enterprise Architecture Model / NIST Special Publication 800-53 / Standards organizations / Computing / Computer security

Microsoft Word - BD_Vol7-TechRoadmap_V1Draft_Pre-release.docx

Add to Reading List

Source URL: jtc1bigdatasg.nist.gov

Language: English - Date: 2014-05-01 23:19:53
929CISL / Richmond /  British Columbia / Threat / Denial-of-service attack / Vulnerability / Cyberwarfare / Computer security / Computer network security

Some Representational Limitations of the Common Intrusion Specification Language Jon Doyle Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 15:30:30
930Cyberwarfare / Crime prevention / National security / Software testing / Institute for Information Infrastructure Protection / Wireless security / Vulnerability / Critical infrastructure protection / Cyber-security regulation / Computer security / Computer network security / Security

CSIIR Workshop Theme This document is meant to help focus the CSIIR workshop participants in developing their individual presentations as well as to give context toward the common goal of developing our near term researc

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2005-02-27 20:20:42
UPDATE