Computer security conference

Results: 514



#Item
381Ethics / Personal life / Personally identifiable information / Public safety / Identity management / Information security / Internet privacy / Privacy / Security / Data security / Computer security

Strategy for Protecting Personally Identifiable Information (PII) Texas Workforce Conference November 2013

Add to Reading List

Source URL: www.twc.state.tx.us

Language: English - Date: 2014-01-14 08:47:23
382Computer-mediated communication / Integrated Services Digital Network / Internet protocol suite / Network address translation / Voice over IP / Videoconferencing / H.323 / Videotelephony / Electronic engineering / Electronics

VIDEO TELE-CONFERENCE SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 1, Release 1 8 January 2008

Add to Reading List

Source URL: www.freeporttech.com

Language: English - Date: 2010-11-29 10:16:37
383Crime prevention / Data security / Cloud computing / Public safety / Security Policy Framework / Information security / Security / Computer security / National security

Virtualisation Security for Regulated Environments AusCERT2011, Gold Coast, Australia DD.MM.YY Release, May 2011 Conference

Add to Reading List

Source URL: www.senseofsecurity.com.au

Language: English - Date: 2011-06-03 18:07:51
384Computing / Tennessee Valley Authority / Unidirectional network / Diode / Zero-day attack / Vulnerability / OSI model / Computer network security / Cyberwarfare / Computer security

Tennessee Valley Authority’s (TVA) Data Diode Program ICSJWG Spring Conference May 8 9, 2012

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2013-09-26 13:41:12
385Data security / Technology / National security / Computing / Network security / Security awareness / Bring your own device / Fortinet / Information security / Security / Computer security / Computer network security

8th Annual Cyber Security Conference Agenda 8:00a-8:25a – Check-in 8:25a-8:30a – Introduction: Jim Ohmberger, Planning and Project Management Manager OCIO, State of Nebraska 8:30a-9:00a – Welcome: Lavon Heidemann,

Add to Reading List

Source URL: cio.nebraska.gov

Language: English - Date: 2013-05-17 08:55:15
386Computer crimes / Security / National Strategy for Trusted Identities in Cyberspace / International Telecommunication Union / Cyber-security regulation / Cyberspace / International Multilateral Partnership Against Cyber Threats / Internet privacy / Internet-related prefixes / Computer network security / Cyberwarfare / Computer security

REMARKS BY SPECIAL ASSISTANT TO THE PRESDENT AND WHITE HOUSE CYBERSECURITY COORDINATOR MICHAEL DANIEL Gartner Security and Risk Management Conference June 23, 2014 As Prepared for Delivery Good afternoon everyone. It’s

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2014-07-02 11:42:59
387TED / Computer crimes / Cyberwarfare

Presentation Information 9th Annual Nebraska Cyber Security Conference June 3rd, 2014 8:00 am – 4:00 pm Thank you for your interest in participating in the 9th annual Nebraska Cyber Security Conference. Your presentati

Add to Reading List

Source URL: cio.nebraska.gov

Language: English - Date: 2013-11-18 16:28:09
388Computer network security / MQV / Diffie–Hellman key exchange / Authentication / AKA / Cryptography / Cryptographic protocols / Public-key cryptography

An extended abstract of this work appears in Proceedings of the 5th International Conference (SCN ’06) (6 – 8 september 2006, Maiori, Italy) M. Yung Ed., Springer-Verlag, LNCS 4116, Pages 186–200. A New Key Exchang

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:21
389Computer network security / Crime prevention / National security / Public safety / Data security / Information security / Federal Information Security Management Act / Virtual private network / Data center / Security / Computing / Computer security

Association for Public Data Users 2013 Annual Conference: A Sea Change for Public Data George Washington University 800 21st Street NW | Continental Ballroom, 3rd floor | Washington, DC

Add to Reading List

Source URL: apdu.org

Language: English - Date: 2013-09-17 10:42:16
390Network architecture / Cyberwarfare / Inter-process communication / Streaming / Traffic flow / Smurf attack / IP address spoofing / Firewall / Denial-of-service attack / Computing / Computer network security / Denial-of-service attacks

USENIX Association Proceedings of the 14th Systems Administration Conference (LISA[removed]New Orleans, Louisiana, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-02-11 22:53:46
UPDATE