Computer network security

Results: 18127



#Item
781Security / Government / Safety / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
782Cybercrime / Security / Misconduct / Crime / Social engineering / Spamming / Identity theft / Computer network security / Phishing / Computer security / Website defacement / Targeted threat

JPCERT/CC Incident Handling Report[October 1, 2015 – December 31, 2015]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2016-03-24 22:49:18
783Computing / Cloud computing / Security / Computer network security / Computer security / Stack / Threat

CA S E S T U DY SIMPLE FINANCE TECHNOLOGY COMPA NY Simple Finance Technology Company is reinventing online banking with modern web and mobile experiences, no surprise fees, and great customer service. Simple provides cu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-07 11:06:45
784Security / Computing / Carnegie Mellon University / Computer security / Cyberwarfare / Computer network security / Computer emergency response team / CERT Coordination Center / National Cyber Security Centre / Cert / Threat / Organisation of Islamic Cooperation

APCERT Secretariat: JPCERT/CC Japan Computer Emergency Response Team Coordination Center Contact: URL: www.apcert.org

Add to Reading List

Source URL: www.apcert.org

Language: English - Date: 2016-03-16 04:50:40
785Computer network security / Hacking / Software testing / Vulnerability / Computer security

Side Channel Vulnerabilities on the Web - Detection and Prevention Sebastian Schinzel Virtual Forge GmbH

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2010-11-30 18:42:34
786Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
787Computer network security / Computer security / Software testing / OpenVAS / Nessus / Penetration test / Hacking / Nmap / Vulnerability / Application firewall

Jordan Wright Permanent Address: 5903 Babcock Rd. AptSan Antonio, TXContact: jordan-wright.github.io

Add to Reading List

Source URL: jordan-wright.com

Language: English - Date: 2016-04-10 15:44:49
788Computing / Cyberwarfare / Computer security / Computer network security / Cybercrime / Spamming / Social engineering / Botnet / Web threat / Malware / Vulnerability / Computer virus

Fighting the ‘Good’ Internet War Dan Cvrˇcek† and George Danezis 1 University of Cambridge, UK & Brno University of Technology, CZ. 2

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:56
789Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
790Computer network security / Network management / Deep packet capture / NetFlow / Packet analyzer / Denial-of-service attack / Network monitoring

Reclaiming Network-wide Visibility Using Ubiquitous Endsystem Monitors Evan Cooke University of Michigan Richard Mortier, Austin Donnelly, Paul Barham, Rebecca Isaacs Microsoft Research, Cambridge

Add to Reading List

Source URL: mor1.github.io

Language: English - Date: 2016-01-14 10:42:37
UPDATE