Control system security

Results: 2384



#Item
231Cyberwarfare / Antivirus software / Content-control software / Fortinet / Computer security / Application firewall / Spyware / Network security / Firewall / Computer network security / System software / Computing

DATASHEET FortiGuard® Global Security Research and Protection FortiGuard Labs More than 125 security threat researchers, engineers, and forensic specialists comprise

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:00
232Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
233Command and control / Systems science / Military organization / Net-centric / System of systems / Systems theory / Under Secretary of Defense for Acquisition /  Technology and Logistics / Weapon Systems Acquisition Reform Act / Network-centric warfare / Military science / Systems engineering / Military acquisition

PROMOTING NATIONAL SECURITY SINCESESSION TOPICS u u u

Add to Reading List

Source URL: www.ndia.org

Language: English - Date: 2014-10-24 08:22:25
234Web portal / Computing / Seamless / User interface / User

Telguard HomeControl for 2GIG Go!Control Panels Today consumers expect much more than a traditional security system. They expect the ability to interact with, and control, their system using one well-designed system at a

Add to Reading List

Source URL: www.telguard.com

Language: English - Date: 2015-01-29 15:40:30
235Identity management / Kernel / Operating system / Ring / Capability-based security / Microsoft Access / Authorization / Mandatory access control / Security and safety features new to Windows Vista / Security / Computer security / Access control

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems ROBERT GRIMM and BRIAN N. BERSHAD University of Washington

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2002-10-18 14:01:21
236Computer network security / Middlebox / Software Defined Networking / Firewall / OpenFlow / Virtual appliance / Cloud computing / Computer network / Network switch / Computing / Software / System software

Challenges in Unifying Control of Middlebox Traversals and Functionality Aaron Gember, Theophilus Benson, Aditya Akella University of Wisconsin – Madison {agember,tbenson,akella}@cs.wisc.edu

Add to Reading List

Source URL: agember.com

Language: English - Date: 2012-07-24 14:23:45
237Computer security / Government / United States Computer Emergency Readiness Team / ICS / National Cyber Security Division / Public safety / Security / United States Department of Homeland Security

Control Systems Architecture Analysis Services Design Architecture Review The Industrial Control System Cyber Emergency Response Team’s (ICS-CERT) Design Architecture Review (DAR) provides critical infrastructure asset

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2015-05-28 11:14:30
238Content-control software / Fortinet / Hyper-V / Virtual machine / VM / System software / Software / Computer network security

FortiManager TM Centralized Security Management Take Control of Your Security Infrastructure

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:07
239Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
240Strategic management / Management / Information technology / Competition / Competitive intelligence / National security / Central Intelligence Agency / Decision support system / Defense Intelligence Agency / Information systems / Business intelligence / Decision theory

RIGHT INFORMATION TO THE RIGHT PERSON Good control over the bottom line and overall business, but competitive intelligence that did not always provide a solid foundation for strategic decision making. The Korsnäs team s

Add to Reading List

Source URL: www.we-conect.com

Language: English - Date: 2015-02-12 19:04:36
UPDATE