Computer network operations

Results: 408



#Item
341Computer security / Data security / Software testing / Hacking / Agricultural Research Service / Vulnerability / Attack / Security controls / Inspector General / Computer network security / Security / Cyberwarfare

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report AGRICULTURAL RESEARCH SERVICE SECURITY OVER THE AGRICULTURAL

Add to Reading List

Source URL: www.usda.gov

Language: English - Date: 2005-03-14 09:28:29
342Computer network security / Computer security / Crime prevention / Data security / National Agricultural Statistics Service / Vulnerability / Attack / Information security / Critical infrastructure protection / Security / National security / Cyberwarfare

U.S. Department of Agriculture Office of Inspector General Financial and IT Operations Audit Report SECURITY OVER INFORMATION

Add to Reading List

Source URL: www.usda.gov

Language: English - Date: 2005-03-14 10:10:25
343Public safety / Security / Network security / Computer security

CYBER SECURITY OPERATIONS CENTRE JUNE[removed]U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES TO ASD SHO

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-06-18 01:34:28
344Computing / Personal firewall / Firewall / Network security / Internet security / Application firewall / Distributed firewall / Computer network security / Computer security / Cyberwarfare

References This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of many pr

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:51
345National security / Email / Computer network security / Internet / Password / Internet privacy / Malware / Computer security / Authorization / Security / Computing / Crime prevention

This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential business managers, office managers and operations managers. This appendix is one of many which is being pro

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:28
346Crime prevention / Electronic commerce / National security / Secure communication / Security / Computer network security / Computer security

Security Automation: The Trail Ahead Tony Sager Chief, Vulnerability Analysis & Operations Group Information Assurance Directorate National Security Agency September 28-30, 2010

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
347Risk / Computer network security / Risk management / Federal Information Security Management Act / Security controls / Information security / Vulnerability / Risk assessment / IT risk management / Computer security / Security / Data security

J-6 Information Operations

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
348Net-centric / Military / Cyberinfrastructure / United States Cyber Command / United States Tenth Fleet / United States Strategic Command / International Multilateral Partnership Against Cyber Threats / National Security Agency / Computer network operations / National security / Computer crimes / Military organization

Instructions, Manuals, and Notices

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2012-08-07 15:46:50
349Computer crimes / Net-centric / United States Army Criminal Investigation Command / Department of Defense Cyber Crime Center / Military / U.S. Air Force Office of Special Investigations / Joint Task Force-Global Network Operations / El Cid / Special agent / Howard Schmidt / Year of birth missing / Military science

United States Army Criminal Investigation Command Media contact: [removed]FOR IMMEDIATE RELEASE

Add to Reading List

Source URL: www.cid.army.mil

Language: English - Date: 2010-02-22 10:23:45
350National security / Technology / Public safety / Computer network security / Information technology management / Multifunction printer / Information security / Printer / Computer security / Security / Office equipment / Crime prevention

ACTIONABLE INFORMATION[removed]WWW .INFOSECURITY.CA.GOV COMMUNICATIONS AND OPERATIONS MANAGEMENT INFORMATION SHEET NO. 9 (REVISED)

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:53
UPDATE