Computer network operations

Results: 408



#Item
331Security / Academi / Currituck County /  North Carolina / International Peace Operations Association / Central Intelligence Agency / Inspector General / Iraq War / Mercenaries / Private military contractors

Audit of Title IV Wide Area Network Contract National Computer Systems, Iowa City, IA FINAL AUDIT REPORT Audit Control Number[removed]

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2004-09-15 13:26:26
332Software / Denial-of-service attacks / Internet privacy / Spamming / Routing / Denial-of-service attack / Load balancing / Internet security / Tor / Computing / Internet / Computer network security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) SEPTEMBER 2012 Denial of service attacks: Strategies for Mitigation 1.

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:57:39
333Crime / Computer network security / Antivirus software / Malware / Identity management / Computer security / Identity theft / Phishing / Keystroke logging / Cybercrime / Security / Computer crimes

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Personal computing and the implications for agency networks

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:55:03
334Authentication / Notary / Packaging / Password / Multi-factor authentication / Information security / Two-factor authentication / Network security / Security / Access control / Computer security

CYBER SECURITY OPERATIONS CENTRE (UPDATED) AUGUST 2012 Mitigating the use of stolen credentials to access agency information

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:52:25
335Data security / Computer network security / McAfee / Companies listed on the New York Stock Exchange / Security information and event management / Vulnerability / Asset / Threat / Host Based Security System / Computer security / Security / Cyberwarfare

Solution Brief McAfee Security Management Get proactive—coordinate operations with real-time intelligence McAfee Security Management

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:54
336Computing / Cyberwarfare / Computer security / Virtual private network / Split tunneling / Internet security / Avaya VPN Router / Mobile virtual private network / Computer network security / Network architecture / Internet privacy

       CYBER SECURITY OPERATIONS CENTRE  APRIL 2013 

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2013-07-17 23:49:01
337Project management / Enterprise architecture / Computer security / Infrastructure optimization / Network performance / Business intelligence / Enterprise architect / Data center / Disaster recovery / Information technology management / Computing / Data management

State CIO Priorities for 2013 November 13, 2012 A. Priority Strategies, Management Processes and Solutions Top 10 Final Ranking 1. Consolidation / Optimization: centralizing, consolidating services, operations, resources

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2012-11-13 09:39:42
338Computer network security / CCSI / General Services Administration / Software testing / Vulnerability / IDIQ / Security operations center / Cyberwarfare / Security / Computer security

Written Testimony of: Maggie Bauer Senior Vice President Creative Computing Solutions, Inc. (CCSi) Prepared for:

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2013-11-18 10:23:26
339United States government secrecy / Computer network security / Counter-intelligence / Security clearance / Counterintelligence / Operations security / Computer security / Classified information / Security / National security / Espionage

United States Department of Agriculture Departmental Management Office of Homeland Security & Emergency Coordination

Add to Reading List

Source URL: www.ocio.usda.gov

Language: English - Date: 2014-07-01 10:52:50
340Security / Grid computing / Computer security / Defense Information Systems Agency / Department of Defense Architecture Framework / NetOps / Global Information Grid / Government procurement in the United States / Information security / Net-centric / Military / Military communications

NETCENTS-2 SOLUTIONS Network Operations (NetOps) and Infrastructure Solutions BASE COMMUNICATIONS and INFORMATION TECHNOLOGY (IT) SERVICES AIR FORCE MATERIEL COMMAND (AFMC) ARNOLD ENGINEERING DEVELOPMENT COMPLEX (AEDC) 2

Add to Reading List

Source URL: www.arnold.af.mil

Language: English - Date: 2014-06-16 14:32:52
UPDATE