Cyber

Results: 13321



#Item
671

Zielsetzung Nationales Cyber-Abwehrzentrum zur... …Optimierung …Optimierung der der

Add to Reading List

Source URL: www.visit.isb.admin.ch

- Date: 2016-07-01 03:11:09
    672Cybercrime / National security / Cyberwarfare / Computer network security / Computer security / Cryptography / Cyber-attack / Debriefing

    CyberGymEurope_logo_vertical

    Add to Reading List

    Source URL: www.cybersecurity.cz

    Language: English - Date: 2016-06-02 11:22:20
    673Ambient intelligence / Fashion accessories / Humancomputer interaction / Internet of Things / Wearable devices / Wearable computer

    Recent advances in sensors, cloud computing, and related technologies are making wearables a powerful component of Cyber-Physical Systems (CPSs). These advances promise to provide wearables with the ability to observe pa

    Add to Reading List

    Source URL: mmds-data.org

    Language: English - Date: 2016-06-23 15:50:48
    674Cybercrime / National security / Cyberwarfare / Computer security / Hacking / United States Cyber Command / United States Army Cyber Command / Cyber / Cyberwarfare in the United States / Military-digital complex

    THE FACTS: CYBERSECURITY RESOURCES A collection of resources to help you protect yourself online. Free antivirus software is available online for DoD employees to download and use at home (authentication required) Websit

    Add to Reading List

    Source URL: www.arcyber.army.mil

    Language: English - Date: 2016-03-15 15:31:42
    675Cyber-physical system / Frame language / Detlef Zhlke

    Industry 4.0 xxx production paradigm The new Prof. Dr.-Ing. Dr. h.c. Detlef Zühlke xxx

    Add to Reading List

    Source URL: mmri.mcmaster.ca

    Language: English - Date: 2016-04-15 14:42:28
    676

    ESG Cyber Training Center D E D I C AT E D T O S O L U T I O N S Seminar: Industrial Control System Security – Grundlagen und

    Add to Reading List

    Source URL: www.cybertraining.esg.de

    Language: German - Date: 2016-07-07 08:50:30
      677Anthropology / Historic Environment Scotland / Royal Commission on the Ancient and Historical Monuments of Scotland / Scottish architecture / Digitizing / Cyber-ethnography / Ethnography

      Collaborative Doctoral Award In the Hands of the User : Changing patterns of participation and learning through the digital collections of the Royal Commission on the Ancient and Historical Monuments of Scotland Researc

      Add to Reading List

      Source URL: projects.beyondtext.ac.uk

      Language: English - Date: 2016-06-01 10:17:13
      678Cybercrime / National security / Computer security / Secure communication / Cyberwarfare / Sony Pictures Entertainment hack / Security hacker / Cyber-attack

      Microsoft Word - Sample blog post from PowerLine.docx

      Add to Reading List

      Source URL: bestwritetech.com

      Language: English - Date: 2016-05-03 15:10:28
      679

      Cyber-Praxisansatz  IT-Sicherheitsstrategie Kooperation:  ASW Bundesverband  Bundesverband für IT-Sicherheit - TeleTrusT Prof. Dr. (TU NN)

      Add to Reading List

      Source URL: norbert-pohlmann.com

      Language: German - Date: 2016-03-18 09:50:48
        680National security / Emerging technologies / Life skills / Motivation / Business continuity and disaster recovery / Resilience / Psychological resilience / Computer security / Autonomous car / Platoon / Ecological resilience / Vehicular automation

        Session 19 - CYBER SECURITY AND RESILIENCE CHALLENGES AND OPPORTUNITIES FOR SELF-DRIVING VEHICLES

        Add to Reading List

        Source URL: higherlogicdownload.s3.amazonaws.com

        Language: English - Date: 2016-08-04 10:12:32
        UPDATE