Cyber

Results: 13321



#Item
591Safety / Engineering / Safety engineering / Risk / Reliability engineering / Software quality / Hazard analysis / Actuarial science / Hazard / Systems engineering / Security / Risk management

Cyber Security An Evolving Systems Engineering Requirement 21 August 2013 Is a Vehicle, an

Add to Reading List

Source URL: www.ndia-mich.org

Language: English - Date: 2013-08-19 13:54:40
592Software development / Software engineering / Software / Hypertext Transfer Protocol / Session / World Wide Web / Version control

University of Birmingham Computer Science Programme Timetable: MSc Cyber Security

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2016-04-28 08:42:05
593Security / Computer security / Cyberwarfare / Secure communication / Cybercrime / Computer network security / Data security / Data breach / Balabit / Threat / Insider threat / Cyber-attack

www.balabit.com Why do companies need User Behavior Analytics? "Only amateurs attack machines; professionals target people. And any solutions will have to target the people problem, not the math problem."1

Add to Reading List

Source URL: pages.balabit.com

Language: English - Date: 2016-08-13 13:21:12
594United States Department of Homeland Security / Government / National security / Prevention / DHS National Protection and Programs Directorate / Resilience / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / Federal Protective Service / Homeland security / National Cyber Security Division

AprilVolume 2, Issue 1 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights cross-sector initiatives, and identifies training and exercise opportunities, new tool

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2015-07-02 14:45:27
595Security / Cyberwarfare / Computing / Cryptography / Computer network security / Computer security / Crime prevention / National security / National Security Agency

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36
596Mobile robot / Wireless sensor network / Robot / Taarlab / Cyber-physical system

Our robot can help to find your radios! The title of José Vallet’s thesis is Localization in Wireless Sensor Networks Using a Mobile Robot. Modern mobile robots are capable of creating maps of their surroundings and e

Add to Reading List

Source URL: www.fgi.fi

Language: English - Date: 2016-05-03 09:26:29
597Florida / Galaxies / Supermassive black hole / Florida Institute of Technology / University of Florida / Lightning / Coral reef / Biofouling

Geoffrey Swain: Master of Marine Coatings Two Cyber Warriors Lead the Fight

Add to Reading List

Source URL: newsroom.fit.edu

Language: English - Date: 2015-04-07 10:27:38
598Standards / Professional certification / Accreditation / Evaluation / Value / Professional studies / Cyber security standards

Base Standard Program Recycling Industry Operating Standard (RIOS) CB Application for Accreditation FA 5016

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:11:28
599Military / International relations / Military units and formations of NATO / NATO / Supreme Headquarters Allied Powers Europe / BALTOPS / Allied Command Transformation / Cold Response / North Atlantic Treaty / Standing NATO Maritime Group 1 / Operation Saber Strike / Cooperative Cyber Defence Centre of Excellence

North Atlantic Treaty Organization Fact Sheet June 2016 Key NATO & Allied Exercises NATO Allies and Partners conduct exercises to test procedures and tactics,

Add to Reading List

Source URL: www.nato.int

Language: English - Date: 2016-06-21 05:46:41
600

U svijetu cyber incidenti sve veća prijetnja kompanijama, u Hrvatskoj krađa i korupcija Potencijalni rizici s kojima se suočavaju kompanije na globalnoj razini uvelike se mijenjaju ugodini. Dok su kompanije man

Add to Reading List

Source URL: sigurnostnainternetu.hr

Language: Croatian - Date: 2016-01-14 21:36:43
    UPDATE