Computer security conference

Results: 514



#Item
481Technology / Wi-Fi / Network access / Wireless access points / Wireless / Wireless security / IEEE 802.11 / Captive portal / Wireless LAN / Computer network security / Wireless networking / Electronic engineering

CASE STUDY COMSNETS and ACM DEV Conferences Delivering Reliable Wi-Fi Access in a High User Density Conference Environment AirTight Wi-Fi stands up to the challenge of hundreds of technically savvy simultaneous users, wh

Add to Reading List

Source URL: www.airtightnetworks.com

Language: English - Date: 2013-09-13 06:05:47
482Engineering / Wireless sensor network / Wireless ad-hoc network / Mobile ad hoc network / Computer network / International Conference on Mobile Computing and Networking / IEEE Transactions on Mobile Computing / Institute of Electrical and Electronics Engineers / Wireless / Wireless networking / Technology / Telecommunications engineering

Networking and Security Research Center at Penn State nsrc.cse.psu.edu Professor Thomas F. La Porta, Director Department of Computer Science and Engineering

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2014-03-17 18:01:42
483Ambient intelligence / Computer security / Wireless sensor network / Cloud computing / Smart grid / Ring / Security / Technology / Computing

SHCIS ’14 - 1st Workshop on Security in highly connected IT systems Held in parallel with 11th International Conference on Trust, Privacy & Security in Digital Business - TrustBus 2014 http://dexa.org/trustbus2014 Muni

Add to Reading List

Source URL: www.dexa.org

Language: English - Date: 2014-03-26 09:43:24
484Military technology / Cyberwarfare / Computer crimes / War / Advanced persistent threat / Computer security / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Security / Hacking / Electronic warfare

Managing cyber risk – the global banking perspective Speech given by Andrew Gracie, Executive Director, Resolution, Bank of England British Bankers’ Association Cyber Conference, London 10 June 2014

Add to Reading List

Source URL: www.bankofengland.co.uk

Language: English - Date: 2014-06-10 04:38:11
485Data security / Public safety / Public administration / European Union / Europa / Information security / International Conference on Availability /  Reliability and Security / European Network and Information Security Agency / Security / Computer security

About ENISA Welcome to the web site of ENISA -the European Network and Information Security Agency, working for the EU Institutions and Member States. ENISA is the EU’s response to these cyber security issues of the E

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2012-09-05 08:21:02
486Greenbelt /  Maryland / Security / Computer data storage / NASA / National Center for Atmospheric Research / Jay Ranade / Computer security / Atmospheric sciences / Meteorology / Goddard Space Flight Center

Preface The Fifth Goddard Conference on Mass Storage Systems and Technologies has attracted more than forty papers which are included in these Proceedings. We plan to include audio and video and, if available, text and v

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-04-22 11:53:50
487Security / Computer security / Accountancy / Information Systems Audit and Control Association / Corporate governance of information technology / Internal audit / Information technology security audit / Audit / Information security audit / Information technology audit / Auditing / Data security

ISACA Malaysia & MNCC 12th Annual IT Governance, Assurance and Security Conference 18 & 19 June 2013 ISACA

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2013-04-19 11:03:18
488Business law / Copyright law / Security / Trusted Platform Module / Trustworthy computing / Trusted Execution Technology / Security-Enhanced Linux / Mandatory access control / Type enforcement / Computer security / Trusted computing / Cryptography

The 9th International Conference for Young Computer Scientists Model–Driven Remote Attestation: Attesting Remote System from Behavioral Aspect Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Yanzhen Zou1 , Bing Xie1 , W

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:16:45
489Public safety / Computer emergency response team / Cyberwarfare / Computer security / International Multilateral Partnership Against Cyber Threats / Crime / United States Department of Homeland Security / Cyber security and countermeasure / Computer crimes / Security / Carnegie Mellon University

Centre for Security Cooperation Conference on “Computer Emergency Response Teams (CERTs-CIRTs-CSIRTs)” -Present cooperation among regional CERTs, and how it could be further enhanced06-07 May 2014, Zagreb, Croatia

Add to Reading List

Source URL: www.racviac.org

Language: English - Date: 2014-05-20 08:13:18
UPDATE