Computer security conference

Results: 514



#Item
311Public economics / Homeland Security Grant Program / Surveillance / War on Terror / Government / United States Department of Homeland Security / Computer security / Vulnerability / Federal grants in the United States / Grants / Federal assistance in the United States / Public finance

2014 Homeland Security Grant Application Teleconference Question and Answer Session Minutes Wednesday, September 23, 2014 – 6:00 p.m. The Question and Answer Session Conference Call began at 6:00 p.m. with twelve (12)

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-09-25 09:48:34
312Data security / Crime prevention / Certified Information Systems Security Professional / Corey Schou / Gene Spafford / Information security / National Security Agency / Protection Profile / Common Criteria / Security / Computer security / National security

22nd National Information Systems Security Conference Conference Committee 1999 National Computer Systems Security Award Papers Find and Fix Y2K Embedded Equipment Risks

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-10-25 01:00:00
313Crime prevention / National security / Data security / Information security / Common Criteria / Telos / Information assurance / Gene Spafford / FIPS 140-2 / Security / Computer security / Cyberwarfare

21st National Information Systems Security Conference Papers Assurance/Criteria/Testing Track A

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-30 00:00:00
314Public safety / Cryptography / Digital rights management / InterTrust Technologies / Information security / National Security Agency / Computer security / Lawrence Livermore National Laboratory / Security / Crime prevention / National security

20th National Information Systems Security Conference Referred Papers Early Bird Session Information Security is Information Security ......................................................................................

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1997-10-21 01:00:00
315Crime prevention / National security / Evaluation / Common Criteria / Microsoft PowerPoint / National Security Agency / Information security / Trusted Computer System Evaluation Criteria / Trusted system / Computer security / Security / Computing

19th National Information Systems Security Conference Proceedings This is the table of contents to the papers, panel statements and presentations which were submitted in electronic form. Each paper was converted to Adobe

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2005-04-18 01:00:00
316Infrastructure / Computer crimes / Public safety / Cyberwarfare / Critical infrastructure / Howard Schmidt / International Multilateral Partnership Against Cyber Threats / Computer security / Smart grid / United States Department of Homeland Security / Security / National security

CYBERSPACE, ENERGY & DEVELOPMENT: Protecting Critical Energy Infrastructure October 10, 2014 Popov Room, ITU Headquarters, Geneva (Update: 06 October[removed]This international conference will be co-organized and co-hosted

Add to Reading List

Source URL: www.energypact.org

Language: English - Date: 2014-10-08 12:08:10
317Hacking / Military technology / Security / Crime / Technology / Stuxnet / Computer security / Hacker / Computer virus / Computer crimes / Cyberwarfare / Electronic warfare

SIG 2012 Conference National Convention Centre Wednesday 5 September 2012, 9.45am

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-10 14:29:20
318Management / Public safety / Actuarial science / Risk analysis / Information security / IT risk / Risk management / Business continuity planning / Insurance / Security / Computer security / Data security

IT EXAMINATION (E) WORKING GROUP Conference Call Tuesday, October 28, 2014 2:00 p.m. ET / 1:00 p.m. CT / 12:00 p.m. MT / 11:00 a.m. PT ROLL CALL Pat McNaughton, Chair

Add to Reading List

Source URL: www.naic.org

Language: English - Date: 2014-10-20 14:12:19
319Risk management / Computer security / Information security / Vulnerability / Security risk / Threat / IT risk management / IT risk / Security / Risk / Management

Addendum to Proceedings of the 9th National Computer Security Conference, September 15-18, 1986

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-08 13:46:42
320Data quality / Computer security / Data validation

  AJLA Conference Boston, MA

Add to Reading List

Source URL: www.ajla.net

Language: English
UPDATE