Cyber

Results: 13321



#Item
651Ambient intelligence / Fashion accessories / Humancomputer interaction / Internet of Things / Wearable devices / Wearable computer

Recent advances in sensors, cloud computing, and related technologies are making wearables a powerful component of Cyber-Physical Systems (CPSs). These advances promise to provide wearables with the ability to observe pa

Add to Reading List

Source URL: mmds-data.org

Language: English - Date: 2016-06-23 15:50:48
652Computer network security / Cybercrime / Cyberwarfare / Rogue software / Computer security / Cryptography / Zero-day / Malware / Computer virus / Vulnerability / Rogue security software / Symantec

Facing the Cyber Threat: The Need for a Paradigm Change in Cyber Security Ammar Alkassar, CEO Rohde & Schwarz Cybersecurity May, 9th 2016, Tallinn | NCI Agency Industry Conference and AFCEA TechnNet International

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 11:00:48
653Standards organizations / Accreditation / Professional certification / ISO/IEC JTC 1 / International Organization for Standardization / Cyber security standards / ISO/IEC JTC 1/SC 27

Base Standard Program ISOEnvironmental Management Systems CB Application for Accreditation FA 5001

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:03:08
654Community building / Social information processing / Virtual reality / Social psychology / Social networks / Social networking service / Social capital / Online community / Social network / Internet / Online participation / Educational technology

(Journal of Technology Education, 60(1), Analyzing Online Teacher Networks: Cyber-Networks Require Cyber-Research Tools Mark S. Schlager,1 Umer Farooq,1 Judith Fusco,2 Patricia Schank,2 & Nathan Dwyer3 1

Add to Reading List

Source URL: www.tappedin.org

Language: English - Date: 2014-09-04 15:31:32
655Cybercrime / Cyberwarfare / National security / Computer security / Computer network security / United States Cyber Command / United States Army Cyber Command / Credit card / Internet privacy / Cyberspace / Internet fraud prevention

THE FACTS: ONLINE SHOPPING Online shopping is convenient, easy, and quick. But it’s wise to make sure you’re protected before you start adding items to your cart. What can I do to protect myself when shopping online?

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
656Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / International Multilateral Partnership Against Cyber Threats

SEEING THE FUTURE FROM THE PRESENT DAY Cybersecurity: Being Cyber Aware and Cyber Safe

Add to Reading List

Source URL: www.cco.com

Language: English - Date: 2015-07-02 16:02:18
657El Paso /  Texas / San Antonio-El Paso Road / National Collegiate Cyber Defense Competition / Texas Senate / Hudspeth / El Paso

ADVISORY … ATTN ASSIGNMENTS … ADVISORY … ATTN ASSIGNMENTS … ADVISORY … FOR IMMEDIATE RELEASE May 23, 2016 CONTACT: Sito Negron

Add to Reading List

Source URL: www.rodriguez.senate.state.tx.us

Language: English - Date: 2016-05-24 09:07:15
658Fokker / Comac / Sanctions against Iran / Cyber-attack

Overview China Workshop NAG 28 Juni 2016 Andre Hermsen Juni 2016

Add to Reading List

Source URL: www.nag.aero

Language: English - Date: 2016-07-01 10:02:46
659Cyberwarfare / Cybercrime / Computer network security / Spamming / National security / Botnet / Computer security / Phishing / Malware / Ransomware / Storm botnet / Supply chain attack

CYBER SECURITY VOCABULARY - For business leaders UNDERSTAND YOUR IT DEPARTMENT AND LEAD IN THE EVENT OF A CYBER CRISIS Ever found your IT team was speaking a different language when it came to cyber security?

Add to Reading List

Source URL: www.controlrisks.com

Language: English - Date: 2016-08-04 06:27:46
660Cybercrime / Computer security / Hacker groups / Internet-based activism / Cyberwarfare / International cybercrime / Anonymous / Cyber Intelligence Sharing and Protection Act / Sony Pictures Entertainment hack / LulzSec / Hacktivism / United States Department of Homeland Security

INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ...................................................................

Add to Reading List

Source URL: www.bu.edu

Language: English - Date: 2016-01-14 14:26:29
UPDATE