Computer network security

Results: 18127



#Item
251Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
252Wireless networking / Wireless / Synthetic aperture radar / Sensors / Technology / Computing / Computer networking / Sensor node / Wireless sensor network / Unattended ground sensor / Security alarm

iScout® i S co u t ® D E S I G N iScout® sensors were designed to produce exceptional performance while keeping size and cost

Add to Reading List

Source URL: www.mcqinc.com

Language: English - Date: 2015-11-23 09:29:36
253Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
254Safety / Prevention / Medicine / Identity documents / Health informatics / Computer network security / Bracelets / Fashion / Wristband / Medical identification tag / Medical alarm / Artificial cardiac pacemaker

Patients, Pacemakers, and Implantable Defibrillators: Human Values and Security for Wireless Implantable Medical Devices Tamara Denning† , Alan Borning† , Batya Friedman‡ , Brian T. Gill∗ , Tadayoshi Kohno† , a

Add to Reading List

Source URL: secure-medicine.org

Language: English - Date: 2016-03-07 16:20:00
255Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
256Government / Security / Cybercrime / Cyberwarfare / National security / Computer network security / Computer security / Cryptography / Cyber / United States Department of Homeland Security

I 114TH CONGRESS 2D SESSION H. R. 5064

Add to Reading List

Source URL: docs.house.gov

Language: English
257Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
258Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Computer security / Information security / Computer network / Vulnerability

Policy on Responsible and Ethical Use of Computing Resources Final version, approved by the CIT October 26, 1998 Revisions approved by the CIT November 4, 2002 Revisions approved by IT Executive Committee (ITEC) January

Add to Reading List

Source URL: infosec.wfu.edu

Language: English - Date: 2016-02-05 15:10:03
259Performance management / CVSS / Computer network security

D1.1.1 Project Management Handbook

Add to Reading List

Source URL: wikirate.eu

Language: English - Date: 2016-07-01 06:37:58
260Computing / Wireless / Bluetooth / Humancomputer interaction / Bluesnarfing / Computer security / Kali Linux / Fitbit / Wearable technology / Kismet / Security token / Java APIs for Bluetooth

Security of Bluetooth Network Data Traffic Michael Grant Williams DoD Contractor Iowa State University

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2016-06-13 23:23:06
UPDATE