Computer network operations

Results: 408



#Item
241Computer network security / Crime prevention / National security / Software testing / Vulnerability / United States Department of Veterans Affairs / Security operations center / Information security / Security / Computer security / Cyberwarfare

GAO-15-220T Highlights, Information Security: Additional Actions Needed to Address Vulnerabilities That Put VA Data at Risk

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2014-11-18 13:19:19
242National security / Crime prevention / Computer network security / Software testing / Vulnerability / United States Department of Veterans Affairs / Information security / Security operations center / Security / Cyberwarfare / Computer security

GAO[removed]Highlights, Information Security: VA Needs to Address Identified Vulnerabilities

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-11-17 09:30:22
243The Pentagon / United States Air Force / United States Department of Defense / Information warfare / Air University / Network-centric warfare / Air War College / Defense Information Systems Agency / North American Aerospace Defense Command / Military / Cyberwarfare / Net-centric

Computer Networks and Information Warfare: Implications for Military Operations

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 10:27:58
244Computer network / Internet / Electronics / Media technology / Technology / Telecommunication

Nicole c. letto April 18, 2013 Administrative Telecommunications Specialist UITS – Telephone/Network Operations Center

Add to Reading List

Source URL: uwmstartupchallenge.com

Language: English - Date: 2013-09-19 15:31:28
245National security / Crime prevention / Computer network security / Emergency management / Humanitarian aid / Access control / Password / United States Department of Homeland Security / Information security / Security / Public safety / Computer security

West Virginia Division of Homeland Security and Emergency Management E Team Emergency Operations Software Security Access Agreement

Add to Reading List

Source URL: www.dhsem.wv.gov

Language: English - Date: 2014-09-02 13:04:06
246Computer network security / Crime prevention / National security / Software testing / Vulnerability / Controlled Cryptographic Item / Operations security / Communications security / Network security / Cyberwarfare / Security / Computer security

UNCLASSIFIED Edition 3 – summer 2013 IN THIS EDITION

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-12-09 20:30:13
247National security / Surveillance / Public safety / Information security operations center / Network management / Information security / Threat / Malware / Security operations center / Security / Security engineering / Computer security

This incident report is forwarded to CDHE and the Office of Information Technology in accordance with the policies and procedures for reportable incidents as described in the institution’s IT Security Plan or Program.

Add to Reading List

Source URL: highered.colorado.gov

Language: English - Date: 2014-03-14 12:40:04
248Computer network security / National security / Crime prevention / Espionage / Communications security / Classified information / Operations security / Threat / Internet privacy / Security / Cyberwarfare / Computer security

Print Form DOD STANDARD MANDATORY NOTICE AND CONSENT By signing this document, you acknowledge and consent that when you access Department of Defense (DOD) information systems:

Add to Reading List

Source URL: www.arnorth.army.mil

Language: English - Date: 2014-09-08 09:21:10
249Graph operations / Clique / Segmentation / Tree decomposition / Networks / Network analysis / Graph theory / Theoretical computer science / NP-complete problems

COMBINATORIAL CLUSTERING AND ITS APPLICATION TO 3D POLYGONAL TRAFFIC SIGN RECONSTRUCTION FROM MULTIPLE IMAGES B. Vallet a, ∗, B. Soheilian a , M. Brédif a a Université Paris-Est, IGN/SRSIG, MATIS, 73 avenue de Paris

Add to Reading List

Source URL: recherche.ign.fr

Language: English - Date: 2014-07-28 08:05:52
250Teletraffic / Mathematical optimization / Road transport / Traffic flow / Network congestion / Linear programming / Mathematical analysis / Karush–Kuhn–Tucker conditions / Operations research / Applied mathematics / Mathematics

Globecom[removed]Symposium on Selected Areas in Communications Traffic Engineering with Elastic Traffic Chiun Lin Lim and Ao Tang School of Electrical and Computer Engineering, Cornell University {cl377, at422}@cornell.e

Add to Reading List

Source URL: people.ece.cornell.edu

Language: English - Date: 2014-07-08 10:14:00
UPDATE