Cyber

Results: 13321



#Item
661Cyberwarfare / Crime prevention / Computer security / Cryptography / National security / Information security / Malware / National Cyber Security Centre / Threat / United States Computer Emergency Readiness Team

Classification TLP:WHITE Information Sharing and Cyber Security The Benefits of the Malware Information Sharing Platform (MISP) CIRCL Computer Incident Response Center Luxembourg

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-02-16 06:09:03
662Cyberwarfare / Cybercrime / Computer security / Computer network security / Secure communication / Cyber-security regulation / Michigan Cyber Range

OFFICE OF THE GOVERNOR October 2015 National Cyber Security Awareness Technology plays a vital role in our daily lives – California’s citizens,

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2015-10-22 12:53:02
663Committees / United States House of Representatives

NY Metro Joint Cyber Security Conference (NYMJCSCMemorandum of Understanding Please find attached the Memorandum of Understanding between the “COALITION” and the “Organization“. Please carefully read

Add to Reading List

Source URL: nymjcsc.org

Language: English - Date: 2016-03-01 11:38:10
664Standards organizations / Professional certification / Standards / International Organization for Standardization / Accreditation / ISO 10303 / Cyber security standards / ISO

Base Standard Program ISO 13485:2016 Transition CB Application FAAuthority: Accreditation Manager

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-14 16:14:08
665Cyberwarfare / Computer security / Cybercrime / National security / Stuxnet / SCADA / United States Computer Emergency Readiness Team / Carnegie Mellon CyLab / Cyber-attack

New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State

Add to Reading List

Source URL: energyplan.ny.gov

Language: English - Date: 2013-10-11 12:07:43
666Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / Secure communication / International Multilateral Partnership Against Cyber Threats

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2016-08-04 16:58:43
667Respiratory physiology / Cardiovascular physiology / Respiratory therapy / Pulmonary function testing / Intensive care medicine / Blood pressure / Diffusing capacity / Cardiac output / Central venous pressure / Venous return curve / Lung / Exhalation

Microsoft Word - Document1

Add to Reading List

Source URL: cyber-anatomy.com

Language: English - Date: 2014-03-31 14:07:45
668German Research Centre for Artificial Intelligence / Saarbrcken / Cyber-physical system / Detlef Zhlke / Kaiserslautern University of Technology

DFKI_SF_SBMD_SecurityFramework_02.indd

Add to Reading List

Source URL: dfki-3036.dfki.de

Language: English - Date: 2016-01-21 10:32:09
669Cybercrime / National security / Cyberwarfare / Computer security / Computer network security / Air Force Operational Test and Evaluation Center / 1st Information Operations Command

Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:13
670Digital rights / Privacy / Human rights / Law / Legal aspects of computing / Right to privacy / Uganda / Information privacy / Internet censorship / Internet privacy / Internet Governance Forum / Freedom of information

Analysed CYBER LAWS OF UGANDA Plot 41 Gaddafi Road

Add to Reading List

Source URL: unwantedwitness.or.ug

Language: English - Date: 2016-05-16 03:10:50
UPDATE