Computer network security

Results: 18127



#Item
791Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:52:51
792Cloud infrastructure / Computer security / Computer network security / Web hosting / Cloud computing / Amazon Web Services / Threat Stack / Threat / Stack / Cloud computing issues / Eucalyptus

Implementing high-velocity security best practices. A STEP-BY-STEP GUIDE TO

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-07 11:09:10
793Cryptography / Computer security / Security / ISO standards / Computer network security / Computer access control / Smart card / Ubiquitous computing / Authentication / Public-key cryptography / FIPS 140-2 / Security and safety features new to Windows Vista

Microsoft Word - SC037 _2015__v3

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2015-10-01 12:03:19
794Security / Safety / Prevention / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
795Cybercrime / Social engineering / Spamming / Computer network security / Identity theft / Phishing / Computer security / Targeted threat / Internet Security Awareness Training / Votiro

T2 SPEAR PHISHING PROTECTION T2 Employee Defense Training Transform your most exploited vulnerability into a powerful security asset. Spear phishing is the most prevalent and successful tactic used in advanced targeted

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-03-30 09:53:04
796Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-17 08:56:28
797E-commerce / Cybercrime / Cyberwarfare / Computer network security / Computer security / Cryptography / Consumer privacy / Internet privacy / Privacy / Cyber-security regulation / New Jersey Cybersecurity and Communications Integration Cell

White Paper: Clearing the Red Tape Ensnaring Cybersecurity Collaboration

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2014-07-11 18:43:09
798Computing / Computer network security / Multi-agent systems / Spamming / Concurrent computing / Cyberwarfare / Botnet / Distributed computing / Computer virus / Malware / Algorithmic trading / Antivirus software

BOT-TREK CYBER INTELLIGENCE ci.group-ib.com GROUP-IB REPORT: ANALYSIS OF ATTACKS AGAINST TRADING AND BANK CARD

Add to Reading List

Source URL: www.group-ib.ru

Language: English - Date: 2016-02-08 03:52:06
799Security / Computing / Computer security / Computer network security / Software testing / Cryptography / National security / Secure communication / InfraGard / Vulnerability / QuickTime

The Exploit Intelligence Project Dan Guido NYM InfraGard, https://www.isecpartners.com

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
800Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-08-22 21:44:16
UPDATE