Control system security

Results: 2384



#Item
961Cyberwarfare / Security / Telemetry / SCADA / Control system security / Stuxnet / Critical infrastructure protection / Penetration test / Vulnerability management / Computer network security / Computer security / Software testing

PDF Document

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-03-17 09:36:25
962Network architecture / DNS rebinding / Internet / NoScript / IP address / Cross-site request forgery / OpenDNS / Transmission Control Protocol / Domain name system / Computer network security / Computing

How to Hack Millions of Routers

Add to Reading List

Source URL: www.defcon.org

Language: English - Date: 2010-08-20 13:34:12
963Data synchronization / Backup software / Data security / Online backup services / File hosting / Remote backup service / Backup / Data deduplication / Extensible Storage Engine / Computing / Software / System software

A Secure Cloud Backup System with Assured Deletion and Version Control Arthur Rahumed, Henry C. H. Chen, Yang Tang, Patrick P. C. Lee, and John C. S. Lui The Chinese University of Hong Kong, Hong Kong {arahumed,chchen,ta

Add to Reading List

Source URL: www.cse.cuhk.edu.hk

Language: English - Date: 2011-06-22 23:20:17
964Deep packet inspection / Cisco Systems / Videotelephony / Technology / Electronics / Network security / Cisco Wireless Control System / Cisco Catalyst / Cisco ASA / Server appliance / Computing / Computer network security

Business Makes Access to Social Media Sites Safer EXECUTIVE SUMMARY Company: Swanson Health Products Industry: Online Retailer

Add to Reading List

Source URL: www.cisco.com

Language: English
965Logistics / Public safety / Intergraph / Interoperability / Geographic information system / Access control / Emergency management / Backup / OBIX / Security / Management / Computer-aided dispatch

Emergency management Massive crowds lined the streets of Washington DC for the historical inauguration of Barack Obama Preparing for the worst

Add to Reading List

Source URL: www.geoconnexion.com

Language: English - Date: 2013-05-21 05:16:42
966Information theory / Principle of least privilege / Ring / Trusted computing base / Authorization / Operating system / Reference monitor / Privilege / Security / Computer security / Access control

Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-07-02 11:18:02
967Internet Protocol / Concurrent computing / Thread / Parallel computing / Stream Control Transmission Protocol / Operating system-level virtualization / FreeBSD / IPv6 / Transmission Control Protocol / Computing / Network architecture / OSI protocols

Notes From 10 May 2006 Meeting of the Network Stack Cabal 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:51:24
968Computer security / Intrusion detection systems / Snort / Network intrusion detection system / Apache HTTP Server / Burglar alarm / Host-based intrusion detection system / Transmission Control Protocol / Prelude Hybrid IDS / Software / System software / Computer network security

Security Information Management b-i branding. technology. integration. www.b-i.com

Add to Reading List

Source URL: www.b-i.com

Language: English - Date: 2014-06-17 04:23:05
969International security / Peace / Peacekeeping / National security / Security sector reform / SALW / Small arms / Geneva Centre for the Democratic Control of Armed Forces / Human security / Security / International relations / Arms control

Small Arms and Security System Reform Parliamentary Handbook 2010 Parliamentary Forum on Small Arms and Light Weapons

Add to Reading List

Source URL: www.parliamentaryforum.org

Language: English - Date: 2014-02-27 19:39:05
970Software / Citrix XenApp / System software / Citrix Systems / Transmission Control Protocol / Thin client / Independent Computing Architecture / Remote desktop / Remote administration software / Computing

Jasper Bongertz Senior Consultant, Fast Lane GmbH Network Analysis, IT Security, Virtualization 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-07-09 20:15:27
UPDATE