Computer security conference

Results: 514



#Item
441HashKeeper / National Software Reference Library / Computer file / Computer security / Hash list / Computing / Hashing / Cryptographic hash functions / Error detection and correction

2003 CYBER CRIME CONFERENCE Effectiveness of Hash Sets Douglas White National Institute of Standards & Technology

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2003-12-09 19:03:52
442Federal Emergency Management Agency / United States Department of Homeland Security / Hurricane Katrina / United States Conference of Mayors / Interoperability / Homeland security / Homeland Security Grant Program / Computer security / California Emergency Management Agency / Public safety / Emergency management / Security

PDF Document

Add to Reading List

Source URL: usmayors.org

Language: English - Date: 2013-01-18 00:00:39
443Law enforcement in the United States / Port security / Definitions of terrorism / Computer security / Vulnerability / Counter-intelligence and counter-terrorism organizations / Reactions to the 2010 Moscow Metro bombings / Security / National security / Public safety

Ministerial Conference on International Transportation Security (2006)

Add to Reading List

Source URL: www.mlit.go.jp

Language: English - Date: 2006-01-17 05:14:30
444Cyberwarfare / Crime prevention / National security / Computer network security / Information security / Vulnerability / Security engineering / Threat / Risk / Security / Computer security / Public safety

Information Security Threat-Based Security Engineering How to Forecast Risk More Accurately than Michael Fish Forecasts the Weather BCS-ISSG Annual Conference

Add to Reading List

Source URL: www.jlis.co.uk

Language: English - Date: 2013-12-20 04:34:30
445Privacy / Internet privacy / Computer emergency response team / Computer security conference / Ethics / Identity management / Law

PRIVATE LIVES AND CORPORATE RISK: digital privacy - hazards and responsibilities June[removed], 2007 Melia Sevilla Hotel Seville, Spain PROTECTING PRIVATE and PERSONAL INFORMATION

Add to Reading List

Source URL: www.first.org

Language: English - Date: 2010-07-15 12:31:45
446Computer network security / Software testing / Hacking / OWASP / Application security / Southeast Community College / Vulnerability / Computer security / Security / Cyberwarfare

Conference: Tuesday, June 3, 2014 Venue: SCC Continuing Education Center 301 S. 68th St. Place Lincoln, NE 9th Annual

Add to Reading List

Source URL: www.cio.nebraska.gov

Language: English - Date: 2014-04-10 10:20:58
447Federal Emergency Management Agency / United States Department of Homeland Security / Hurricane Katrina / United States Conference of Mayors / Interoperability / Homeland security / Homeland Security Grant Program / Computer security / California Emergency Management Agency / Public safety / Emergency management / Security

THE UNITED STATES CONFERENCE OF MAYORS 2005 National Action Plan on Safety and Security in America’s Cities (Working Paper of[removed]Overview One month after the attacks of September 11, 2001, The United States Conf

Add to Reading List

Source URL: www.usmayors.org

Language: English - Date: 2013-01-18 00:00:39
448Cyberwarfare / Information Security Automation Program / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / CVSS / Security controls / National Institute of Standards and Technology / Security Content Automation Protocol / Computer security / Security / Computing

4th Annual IT Security Automation Conference http://nvd.nist.gov/scapconf2008.cfm Monday, September 22, [removed]

Add to Reading List

Source URL: nvd.nist.gov

Language: English
449Health / Health informatics / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Electronic health record / Information security / Office of the National Coordinator for Health Information Technology / Data breach / Security / Computer security / Data security

HIPAA 2013 Conference, May 21-22, [removed]FINAL AGENDA

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-05-28 13:36:00
450Security Content Automation Protocol / Extensible Configuration Checklist Description Format / National Vulnerability Database / Federal Information Security Management Act / Open Vulnerability and Assessment Language / Vulnerability / McAfee / National Cybersecurity Center / Mitre Corporation / Computer security / Security / Computing

September 27-29, 2010  Baltimore, Maryland Baltimore Convention Center Conference Agenda Monday, September 27 7:00 – 9:00 am

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
UPDATE