Cyber

Results: 13321



#Item
471Politics of the United States / Conservatism in the United States / Business / United States / American people of German descent / Climate change skepticism and denial / Donald Trump / The Apprentice / WWE Hall of Fame / Ted Cruz / Donald Trump presidential campaign / Republican National Convention

Mullings An American Cyber-Column Last Night in Cleveland Rich Galen

Add to Reading List

Source URL: www.mullings.com

Language: English - Date: 2016-07-22 12:12:26
472Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / Cryptography / Threat

Experimental  Challenges  in  Cyber  Security:   A  Story  of  Provenance  and  Lineage  for  Malware   Tudor  Dumitraș                  

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-22 18:12:38
473Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 14:51:02
474Security / Prevention / Cyberwarfare / Cybercrime / National security / Safety / Computer security / Cyber-security regulation / Politics and technology / International Federation for Information Processing / Cyber / Lecture Notes in Computer Science

TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail: http://tylermoore.ens.utulsa.edu/ tel: +

Add to Reading List

Source URL: tylermoore.ens.utulsa.edu

Language: English - Date: 2016-03-24 11:13:01
475Security / Computing / Law enforcement / Prevention / Symbol / Cyber-physical system / Computer security / Information flow

Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation

Add to Reading List

Source URL: cs.mst.edu

Language: English - Date: 2015-04-03 16:07:48
476Economy / Types of insurance / Finance / Money / Insurance / Financial institutions / Actuarial science / Reinsurance / Liability insurance

MARSH CYBER ECHO: A PREDICTABLE EXCESS COVERAGE SOLUTION UNDERWRITTEN BY LLOYD’S Following a series of high-profile cyber losses, underwriters have become more selective, and in some cases are reducing the amount of ca

Add to Reading List

Source URL: www.kessler.ch

Language: English - Date: 2016-08-08 04:00:18
477Delaware / New Netherland / New Sweden / Wilmington /  Delaware / East Coast of the United States / Geography of the United States / Fire departments in Delaware / Delaware locations by per capita income

Personal Cyber List - for Initial Review as ofwith Addresses TPID NAME METZ, GEORGE A PATEL, HETAL C CANALE, JAMES A

Add to Reading List

Source URL: www.revenue.delaware.gov

Language: English - Date: 2016-03-03 15:52:32
478Recipients of the Legion of Merit / Military personnel / Military / United States Army Cyber Command / William Gainey / Martin Barreras

Command Sgt. Maj. William G. Bruns Command Sergeant Major, U.S. Army Cyber Command and Second Army Command Sgt. Maj. William G. Bruns assumed responsibility as the U.S. Army Cyber Command and Second Army command sergeant

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-08 19:38:26
479Security / Prevention / Safety / Actuarial science / Computer network security / Computer security / Enterprise architecture / Department of Defense Architecture Framework / UPDM / Risk management / Threat / Vulnerability

Blade Risk Manager Automated Risk Assessment The cyber threats facing cyber systems demands a solution capable of understanding their enormity and complexity, visualizing attack options, assessing vulnerabilities and fac

Add to Reading List

Source URL: www.kdmanalytics.com

Language: English - Date: 2015-03-10 10:01:35
480Security / Prevention / Safety / National security / Business continuity / Civil defense / Resilience / Cyberwarfare / Systemically important payment systems / Computer security / Cyber threat intelligence / Cyber-attack

Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-08-16 13:52:59
UPDATE