Computer network operations

Results: 408



#Item
301Computer security / Counter-intelligence / Counterintelligence / Intelligence analysis / Military intelligence / Operations security / Information security / Network security / United States Department of Homeland Security / Security / National security / Espionage

INSIDER THREAT PROGRAM TRAINING COURSE

Add to Reading List

Source URL: insiderthreatdefense.com

Language: English - Date: 2014-07-13 14:18:04
302Denial-of-service attacks / Security / Spamming / Computer worms / Operations security / Adversary model / Denial-of-service attack / Vulnerability / Email spam / Cyberwarfare / Computer security / Computer network security

Notes On The Design Of An Internet Adversary David S. H. Rosenthal1 , Petros Maniatis2 , Mema Roussopoulos3 , TJ Giuli4 , and Mary Baker5 1 4

Add to Reading List

Source URL: lockss.org

Language: English - Date: 2011-05-12 16:55:10
303Information operations / Military / War / Association of Old Crows / Computer network operations / United States Air Force / Cyber Operations / Information warfare / Cyberwarfare / Military science / Electronic warfare

2014 Election Guide Candidates for AOC President Vote for one Dave Hime brings his 40-year civilian career of EW science and technology (S&T) experiences and

Add to Reading List

Source URL: www.crows.org

Language: English - Date: 2014-07-10 15:29:35
304IEEE standards / Telecommunications engineering / Local area network / Wi-Fi / Wireless / Computer network / Metro Ethernet / Technology / Wireless networking / Ethernet

Network  Operations  Manual   Prepared  by:  IT  Architecture  and  Infrastructure   Committee   Document  Version:1.2   Last  Edited:  [removed]  

Add to Reading List

Source URL: www.utexas.edu

Language: English - Date: 2013-09-18 07:12:48
305Space science / Computer security / Twenty-Fourth Air Force / Defense Information Systems Network / United States / Computing / United States Department of Defense / Security / Air Force Space Command

AFLCMC/HI VENDOR DAY Operations Division Colonel Kjäll Gopaul Division Chief AFLCMC/HIZ

Add to Reading List

Source URL: www.gunter.af.mil

Language: English - Date: 2014-05-29 10:02:13
306Defense Information Systems Agency / Computer networking / NetOps / War on Terror / Defense Information Systems Network / Global Information Grid / NIPRNet / Humanities / Operation Enduring Freedom / War in Afghanistan / Contemporary history / United States Department of Defense

Defense Information Systems Agency Operation Enduring Freedom Operation and Maintenance, Defense-Wide Budget Activity 04: Administrative and Service-Wide Activities I. Description of Operations Financed: The Defense Inf

Add to Reading List

Source URL: comptroller.defense.gov

Language: English - Date: 2014-07-09 13:24:53
307Network performance / Operations research / Queueing theory / Emergency medical services / Emergency management / Computer-aided dispatch / 9-1-1 / Management / Statistics / Business

Microsoft Word - Document in Windows Internet Explorer

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2008-05-28 06:23:52
308Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
309Military / Computer crimes / Command and control / Cyberwarfare / Military technology / United States Cyber Command / United States Strategic Command / Joint Task Force-Global Network Operations / Cyberspace / Military science / Military organization / Net-centric

We encourage you to e-mail your comments to us at: [removed]. SUMMER 2011 Vol. 5, No. 2

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2011-07-19 12:46:12
310Media technology / Technology / Printer / Multifunction printer / Ink cartridge / Laser printer / Inkjet printer / HP Deskjet / Toner / Computer printers / Office equipment / Printing

EPA Region 8 Business Case for Reducing Desktop Printers[removed]I. Background In 2009, the Information Systems Program (ISP) requested assistance from the Green Operations Network (GreenOps)* to research the use of desk

Add to Reading List

Source URL: www2.epa.gov

Language: English - Date: 2013-04-24 10:23:20
UPDATE