Computer security conference

Results: 514



#Item
421EMASS / Department of Defense Information Technology Security Certification and Accreditation Process / Knowledge / Quality assurance / DOD Information Assurance Certification and Accreditation Program / System Security Authorization Agreement / Accreditation / Security controls / Mission assurance / Computer security / Department of Defense Information Assurance Certification and Accreditation Process / United States Department of Defense

DoD Information Assurance (IA) Certification & Accreditation (C&A) Process (DIACAP) for 2nd Annual NIST, NSA, DISA Security Automation Conference and Workshop

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
422Subterranea / National security / MTR / Corporate security / Computer security / Hong Kong / Transport in Hong Kong / Security

International Railway Safety Conference 24 – 27 October 2004 “A Systematic Approach to Managing Urban Rail Security and Safety ”

Add to Reading List

Source URL: www.intlrailsafety.com

Language: English - Date: 2005-08-12 13:49:36
423United States Department of Homeland Security / War / Electronic warfare / Hacking / Military technology / Idaho National Laboratory / National Cyber Security Division / Cyber-security regulation / Security / Cyberwarfare / Computer security

The Right Way to Promote Cybersecurity by Bruce J. Heiman, Presenter, RSA Security Conference - February 18-22, 2002 I f you are a computer-savvy but

Add to Reading List

Source URL: www.computerprivacy.org

Language: English - Date: 2012-04-21 11:22:34
424Data security / Information security / National security / Public safety / Department of Defense Cyber Crime Center / Computer security conference / Security / Computer security / Crime prevention

Brian Digman, Chief Information Officer NYS Office of Information Technology Services Empire State Plaza PO Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: ittransformation.ny.gov

Language: English - Date: 2013-06-03 13:02:01
425Electronic Signatures in Global and National Commerce Act / Computer law / Authentication / National Conference of Commissioners on Uniform State Laws / Electronic signature / Law / Security / 106th United States Congress

COLORADO FIRST TO IMPLEMENT THE UNIFORM ELECTRONIC LEGAL MATERIAL ACT TIMELINE

Add to Reading List

Source URL: www.administrativerules.org

Language: English - Date: 2014-07-21 14:36:50
426NetOps / Malware / Situation awareness / Computer security / Public safety / Security / Crime prevention / National security

SCAP Event Standards Support to Computer Network Defense SCAP Conference – October 2009 Kevin Bingham DoD CND Architect

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:46
427Soil contamination / Critical infrastructure protection / Marxist theory / Mediation / Computer network security

Enterprise Remediation Automation IT Security Automation Conference September 27-29, 2010 Chris Johnson

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:51
428Trusted Network Connect / IF-MAP / Security Content Automation Protocol / TNC / Computer security / Computer network security / Trusted computing

SCAP Exchanges in Trusted Network Connect IT Security Automation Conference 2012 Charles Schmidt © 2012 The MITRE Corporation. All rights reserved.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:05
429National security / Security / Computer crimes / Year of birth missing / National Cyber Security Division / International Multilateral Partnership Against Cyber Threats / National Cybersecurity Center / Department of Defense Cyber Crime Center / Cyber-security regulation / Cyberwarfare / Computer security / United States Department of Homeland Security

FISSEA 2014 Conference Program - March 2014

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-26 14:34:43
430Computer network security / Hacking / Software testing / Vulnerability / Blacklist / Open Vulnerability and Assessment Language / Extensible Configuration Checklist Description Format / Security Content Automation Protocol / Computer security / Cyberwarfare / Computing

Enhancing SCAP: Whitelist-based Image Management W. Wyatt Starnes SignaCert, Inc. - Founder and CEO ITSA Conference – October 2009 © Copyright 2008 SignaCert®, Inc.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
UPDATE