Cyber University

Results: 576



#Item
481Data security / Carnegie Mellon University / Disaster preparedness / United States Department of Homeland Security / Computer emergency response team / Incident management / Incident response team / National Cyber Security Division / United States Computer Emergency Readiness Team / Computer security / Public safety / Security

Final Incident Response Guide generic[removed]

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2011-10-07 21:43:56
482Access control / Physical Unclonable Function / Randomness / Computer network security / SCADA / Trusted Platform Module / Cyber-physical system / Password / Authentication / Security / Cryptography / Computer security

Restricted Authentication and Encryption for Cyber-physical Systems Michael Kirkpatrick Department of Computer Science Purdue University [removed]

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-02-11 15:47:46
483International Multilateral Partnership Against Cyber Threats / National Institute of Standards and Technology / Internet privacy / International Telecommunication Union / Standards organizations / Computer crimes

Agenda: 5th Cybersecurity Framework Workshop at North Carolina State University

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-11-08 12:44:37
484Cyberwarfare / Data security / Computer network security / Data breach / Secure communication / University at Albany /  SUNY / Federal Information Security Management Act / State University of New York / Computing / Computer security / Association of Public and Land-Grant Universities / Security

Information Classification Training NYS Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) Sanjay Goel Associate Professor, School of Business

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English
485Social psychology / Bullying / Persecution / Human behavior / Cyber-bullying / Bergen University College / Haemophilus influenzae / Abuse / Ethics / Behavior

Steps to Effective Bullying Prevention/Intervention Practice: Readiness, Preparation, Implementation, Sustainability A Planning Template Anti-HIB Work Group

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2013-06-26 16:53:14
486Survivability / Vulnerability / Cyberwarfare / Critical infrastructure protection / 318th Information Operations Group / Computer security / Mission assurance / Reliability engineering

Mission Based Analysis for Cyber Measurement and Mission Assurance Wende Peters The Johns Hopkins University Applied Physics Laboratory

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
487Data security / Carnegie Mellon University / Disaster preparedness / Computer emergency response team / Incident management / United States Computer Emergency Readiness Team / National Cyber Security Division / Incident response team / Attack / Public safety / Computer security / Security

Final Generic Incident Response Guide.pub

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2013-08-27 11:21:43
488Cyberwarfare / Data security / Computer network security / Data breach / Secure communication / University at Albany /  SUNY / Federal Information Security Management Act / State University of New York / Computing / Computer security / Association of Public and Land-Grant Universities / Security

Information Classification Training NYS Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) Sanjay Goel Associate Professor, School of Business

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2011-02-25 08:56:09
489Social psychology / Bullying / Persecution / Human behavior / Cyber-bullying / Bergen University College / Haemophilus influenzae / Abuse / Ethics / Behavior

Steps to Effective Bullying Prevention/Intervention Practice: Readiness, Preparation, Implementation, Sustainability A Planning Template Anti-HIB Work Group

Add to Reading List

Source URL: www.k12.wa.us

Language: English - Date: 2012-11-26 13:50:56
490Behavior / Bullying / Computer crimes / Aggression / Cyber-bullying / Cyberstalking / Text messaging / Cyberbully / Harassment / Abuse / Cybercrime / Ethics

Cyberbullying: A New Place For An Old Practice Stephen Dueck Memorial University of Newfoundland Table of Contents Abstract …………………………………………………………………………….. . ii

Add to Reading List

Source URL: www.lba.k12.nf.ca

Language: English - Date: 2012-02-29 11:28:53
UPDATE