Critical infrastructure

Results: 3394



#Item
271Synchronous optical networking / Asia / Perusahaan Gas Negara / Fiber-optic communications / Strait of Malacca

COMMTEL CASE STUDY PERUSAHAAN GAS NEGARA Mission-critical infrastructure for the Trans-Asian

Add to Reading List

Source URL: www.commtelns.com

Language: English - Date: 2014-07-31 01:06:45
272Security / Security engineering / United States Department of Defense / Critical infrastructure protection / United States Air Force / Critical infrastructure / National Security Agency / National security / United States Department of Homeland Security / Infrastructure

CRITICAL FOUNDATIONS PROTECTING AMERICA’S INFRASTRUCTURES

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:18:51
273Security engineering / United States Department of Homeland Security / Crime prevention / Critical infrastructure protection / Infrastructure / Computer security / Situation awareness / Risk / National security / Security / Public safety

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:31
274Infrastructure / Institute for Information Infrastructure Protection / Critical infrastructure protection / Infrastructure security / Computer security / Cyberwarfare / Champaign–Urbana metropolitan area / Critical infrastructure / Marcus Sachs / National security / United States Department of Homeland Security / Security

Microsoft Word - ConferenceProgram2008.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2008-03-11 11:11:27
275Data security / Public safety / Agencies of the European Union / European Network and Information Security Agency / Information security / Critical infrastructure protection / National security / Security / Computer security

Technical Guideline on Incident Reporting Technical guidance on the incident reporting in Article 13a Version 2.1, October 2014 www.enisa.europa.eu

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-27 08:06:17
276Converged infrastructure / Pure Storage / Data center / Virtualization / Blade server / Flash memory / Converged storage / Desktop virtualization / Computing / Computer hardware / Computer-mediated communication

FlashStack Converged Infrastructure Simple, Rapid Deployment of 100% Flash Business-Critical IT Infrastructure The Challenge: Data Center Complexity The deployment of data center infrastructure can be complex, time consu

Add to Reading List

Source URL: www.purestorage.com

Language: English - Date: 2015-05-28 17:40:37
277Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
278Cyberwarfare / Computer network security / Data security / Cyber security standards / Critical infrastructure protection / SCADA / RIPE / Vulnerability / North American Electric Reliability Corporation / Security / Computer security / National security

The RIPE Crosswalk Comparing the RIPE cyber security program to ICS security standards and frameworks Perry Pederson November 2014

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2014-11-06 03:38:57
279Construction / Development / Microeconomics / Asset management / National security / Public capital / Critical infrastructure / Public infrastructure / South East Queensland Infrastructure Plan and Program / Infrastructure / United States Department of Homeland Security / Management

OVERVIEW Overview The Strategic Infrastructure Plan for South Australia (the plan) is about meeting South Australia’s future needs. Infrastructure is everywhere in the daily lives of South

Add to Reading List

Source URL: infrastructure.sa.gov.au

Language: English - Date: 2008-03-16 20:21:35
280Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
UPDATE