Computer security conference

Results: 514



#Item
471Computer security / Network forensics / Computer forensics / Forensic science / USB flash drive / Data recovery / Department of Defense Cyber Crime Center / Database forensics / Digital forensics / Cybercrime / Computing

May 2006, IBSA Conference, Vienna The Role of Digital Forensics within a Corporate Organization

Add to Reading List

Source URL: www.digitalforensics.ch

Language: English - Date: 2006-05-25 14:50:47
472Public safety / Prevention / European Network and Information Security Agency / Security awareness / Information security / International Conference on Availability /  Reliability and Security / Computer security / Security / Data security

European Cyber Security Month

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
473Concurrent computing / Social network analysis software / Computing / Network theory / Computer cluster

2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content Ro

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-11-26 12:03:22
474Social issues / Technology / Open government / Public administration / Identity / Privacy / Computer security / Internet privacy / E-Government / Identity management / Ethics / Security

Trust on the Web Web Science Conference[removed]March, 2009 – Athens Jacques Bus, Head of Unit Trust and Security DG Information Society and Media

Add to Reading List

Source URL: www.websci09.org

Language: English - Date: 2009-05-01 11:07:15
475Backup / Data security / Data deduplication / Backup software / Electronic discovery / Computer data storage / File system / Enterprise content management / Database / Information technology management / Computing / Data

T h e S e d o n a C o n f e r e n c e ® W o r k i n g G r o u p S e r i e s SM The Sedona ® Conference Glossary: E-Discovery &

Add to Reading List

Source URL: www.exterro.com

Language: English
476Indian voting machines / Science and technology in India / Elections / Election fraud / Electronic voting / Voting machine / Ballot / Electoral fraud / Secret ballot / Politics / Elections in India / Election technology

To appear in Proc. 17th ACM Conference on Computer and Communications Security (CCS ’10), Oct[removed]For more information, updates, and video of demonstration attacks, visit http://IndiaEVM.org. Security Analysis of Ind

Add to Reading List

Source URL: indiaevm.org

Language: English - Date: 2010-08-15 17:32:11
477Infrastructure / Information technology management / Computer security / Technology / Asset Management Plan / Asset integrity management systems / Configuration management / Asset management / Risk-based inspection / Management / Maintenance / Method engineering

Program Overview Asset Management Conference Monday 2 June

Add to Reading List

Source URL: www.amcouncil.com.au

Language: English - Date: 2014-05-28 23:57:12
478Crime prevention / National security / Computer network security / Safety / Payment systems / CHAPS / Information security / Business continuity / Emergency management / Security / Public safety / Computer security

Business Continuity Conference European Central Bank Panel Discussion Gerd Luebke, Director Head of Re-Engineering & Strategy

Add to Reading List

Source URL: www.ecb.europa.eu

Language: English - Date: 2006-11-06 08:12:53
479Internet / Cross-platform software / Firebird / Port / Computer networking / Stateful firewall / Direct Client-to-Client / Computing / Software / Computer network security

Firebird Conference Prague 2005 The Power of Firebird Events

Add to Reading List

Source URL: www.firebirdsql.org

Language: English - Date: 2011-03-23 01:16:10
480Computer network security / Crime prevention / National security / Data security / Xcon / Vulnerability / Application security / Information security / Database security / Security / Computer security / Cyberwarfare

XCon 2014 XFocus Information Security Conference Call for Paper August, 20th –21st , 2014, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style, XCon sincerely welcomes contributions from information s

Add to Reading List

Source URL: xcon.xfocus.org

Language: English - Date: 2014-03-17 05:16:41
UPDATE