Cyber

Results: 13321



#Item
561Security / Prevention / Cyberwarfare / Safety / Crime prevention / Cryptography / Information governance / National security / Cyber-security regulation / Computer security / Information security / Security guard

Microsoft Word - FINAL CISO Exempt JOB_2016 06 v1

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-06-23 17:40:14
562Standards organizations / Standards / Evaluation / Technology / Technical specifications / Reference / Accreditation / Quality assurance / Professional certification / American National Standards Institute / ISO/IEC JTC 1 / Cyber security standards

Base Standard Program Private Security Company Management Systems CB Application for Accreditation FA 5013

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:09:17
563Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Registered Investment Adviser / Cyber-security regulation / Cybersecurity CS5L CMM

Cybersecurity Guidance for Registered Investment Advisers Client Alert May 5, 2015 On April 28, the Securities and Exchange Commission (SEC) released a Guidance Update addressing the importance of cybersecurity and the s

Add to Reading List

Source URL: www.womensprivateequitysummit.com

Language: English - Date: 2016-02-09 09:34:19
564Technology / Science and technology / Emerging technologies / Information science / Systems engineering / Cyber-physical system / Internet of things / Ontology / ASME / MIT Engineering Systems Division / National Institute of Standards and Technology / Draft:Ram Duvuru Sriram

Toward Internet of Everything: The Role of Ontologies Ram D. Sriram Chief, Software and Systems Division Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD 20899, USA URL:

Add to Reading List

Source URL: ncgia.buffalo.edu

Language: English - Date: 2016-05-18 12:38:26
565Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
566MetricStream / Shellye Archambeau / Aetna / International Multilateral Partnership Against Cyber Threats / Gunjan Sinha / Michael Mullen / Economy of the United States / Business / Military personnel

MetricStream GRC Summit 2016 One of the most anticipated events of the year, the MetricStream GRC Summit 2016 was attended by over 500 GRC leaders from across the world. Held on April 25-27, 2016 in Washington D.C., the

Add to Reading List

Source URL: www.grc-summit.com

Language: English - Date: 2016-06-23 10:56:32
567Maintenance / Survival analysis / Prediction / Computing / Information / Data / Prognostics / Intelligent maintenance system / Cyber manufacturing / Industrial Big Data / Condition monitoring / Big data

HOSSEIN DAVARI ARDAKANI 3121 Riddle View Ln., Cincinnati, OH 45220, USA | Phone: ( – 7476 | Email: Education PhD • Mechanical Engineering • GPA • Expected Graduation Date: J

Add to Reading List

Source URL: www.imscenter.net

Language: English - Date: 2016-05-11 14:01:46
568Types of insurance / Economy / Finance / Money / Institutional investors / Liability / Financial institutions / Cyber-Insurance / Internet security / Insurance / Liability insurance / Professional liability insurance

Acr4656270921770415089.tmp.pdf

Add to Reading List

Source URL: www.crystalco.com

Language: English - Date: 2016-03-10 08:41:27
569Technology / Electronics / Electromagnetism / Computer networking / Sensor node / Wireless sensor network / Signal-to-interference-plus-noise ratio / Radar / Adversary model / Beamforming / Computer network / Throughput

The 2011 Military Communications Conference - Track 3 - Cyber Security and Network Operations Multi-node Coordinated Jamming for Location Privacy Protection Sangho Oh

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-01-16 23:23:23
570Cyberwarfare / Computer security / Security / Computing / Cyber security standards / National Institute of Standards and Technology / Federal Information Security Management Act / Federal Information Processing Standards / National Cybersecurity Center of Excellence / Networking and Information Technology Research and Development

CYBERSECURITY ACTIVITIES AT NIST’S INFORMATION TECHNOLOGY LABORATORY HEARING BEFORE THE SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2016-05-06 11:29:44
UPDATE