Cyber

Results: 13321



#Item
601NATO / Military / Military units and formations of NATO / Joint Analysis and Lessons Learned Centre / Allied Command Transformation / Joint Warfare Centre / Lessons learned / Supreme Headquarters Allied Powers Europe / Allied Land Command / Structure of NATO / Cooperative Cyber Defence Centre of Excellence

What’s inside? JALLC Projects Regional Focus IOs and NGOs TRJR 16

Add to Reading List

Source URL: www.jallc.nato.int

Language: English - Date: 2016-07-18 08:34:29
602Cyberwarfare / Government / Security / Prevention / Infrastructure / United States Department of Homeland Security / National security / DHS National Protection and Programs Directorate / Critical infrastructure protection / Computer security / Cyber Resilience Review / Resilience

Microsoft Word - Ozment-Durkovich Testimony - OMB cleared_No analogy (003)

Add to Reading List

Source URL: docs.house.gov

Language: English
603Security / Prevention / National security / Cybercrime / Cyberwarfare / Hacking / Security engineering / United States Cyber Command / Computer security / Cyber-attack / Cyber / Keith B. Alexander

Microsoft Word - Gen Alexander - Digital Acts of War Testimony - Finaldocx

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2016-07-13 12:55:49
604Security / Cybercrime / National security / Prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / Cyber-attack / Cyberwarfare in the United States / The Centre for Secure Information Technologies

Microsoft Word - SOE - White PaperCyber Security Engineering Studio.docx

Add to Reading List

Source URL: marketing.sandiego.edu

Language: English - Date: 2016-03-03 12:31:40
605Social engineering / Spamming / Cybercrime / Identity theft / Phishing / Misconduct / Crime / Pawn / Organized crime

Appendix Looking Into a Cyber-Attack Facilitator in the Netherlands Appendix

Add to Reading List

Source URL: documents.trendmicro.com

Language: English - Date: 2016-04-21 22:16:38
606

DHV Testbericht LTF 2009 :: ICARO Cyber TE S  

Add to Reading List

Source URL: static.icaro-paragliders.com

Language: German - Date: 2016-04-29 06:26:10
    607Feature detection / Computer vision / Hough transform / Canny edge detector / Edge detection / Error detection and correction / Artificial intelligence / Vision / Chessboard detection / ViolaJones object detection framework

    A Fast and Robust Algorithm for the Detection of Circular Pieces in a Cyber Physical System S.E. de Vegt ES Reports ISSN

    Add to Reading List

    Source URL: www.es.ele.tue.nl

    Language: English - Date: 2015-08-11 07:18:34
    608

    PRESSEMITTEILUNG EU-Initiative klicksafe bringt neue App auf den Markt Erste-Hilfe-App bei Cyber-Mobbing Ludwigshafen, 3. DezemberRund jeder dritte Schüler ist schon einmal im Internet gemobbt worden. Aber was tu

    Add to Reading List

    Source URL: www.klicksafe.de

    Language: German - Date: 2015-12-01 06:28:32
      609Security / Prevention / Cyberwarfare / Cybercrime / National security / Computer network security / Computer security / Cryptography / United States Army Cyber Command / Cyberspace / United States Cyber Command / Password

      THE FACTS: CYBERSECURITY TIPS FOR INTERNATIONAL TRAVELERS Before You Go  Treat your information and communications and the devices that contain and transmit as valuables. The more you protect

      Add to Reading List

      Source URL: www.arcyber.army.mil

      Language: English - Date: 2016-03-15 15:31:42
      610

      Paradigmenwechseln in der Cyber Security  Wie schützen wir uns in der Zukunft? Prof. Dr. (TU NN) Norbert Pohlmann

      Add to Reading List

      Source URL: norbert-pohlmann.com

      Language: German - Date: 2015-11-23 13:37:39
        UPDATE