Cyber

Results: 13321



#Item
721

DHV Testbericht LTF 2009 :: ICARO Cyber TE L  

Add to Reading List

Source URL: static.icaro-paragliders.com

Language: German - Date: 2016-04-29 06:23:56
    722

    Cyber Security – Die Herausforderung unserer Gesellschaft Die aktuellen erfolgreichen Angriffe im Internet zeigen, dass wir uns zurzeit nicht angemessen schützen. I. Cyber Security Probleme Das Internet mit seinen vie

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: German - Date: 2015-12-19 06:51:15
      723Hacker groups / Internet-based activism / Hacking / Politics and technology / Internet vigilantism / Honker Union / Ressentiment / Hacktivism / Anonymous / Tiananmen Square protests / Cyberwarfare / Deprivation

      Hacktivism: a Theoretical and Empirical Exploration of China’s Cyber Warriors Michael Yip Craig Webber

      Add to Reading List

      Source URL: www.websci11.org

      Language: English - Date: 2016-03-15 09:54:42
      724Cyberwarfare / Cybercrime / Computer security / Privacy / Internet privacy / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / National Cybersecurity Center of Excellence

      California Commission Panelist Statements Version 1.0.3

      Add to Reading List

      Source URL: nist.gov

      Language: English - Date: 2016-07-15 13:35:39
      725NPower / Non-profit technology / International Multilateral Partnership Against Cyber Threats / Las Vegas / TechSoup Global / Nonprofit organization

      Our Executive Director’s Message to our 2015 Luncheon Supporters Greetings! Thank you for helping us raise over $250,000 in 2015 for Tech Impact’s 11 th annual Nonprofit Technology Awards Luncheon. Your generous cont

      Add to Reading List

      Source URL: cdn2.hubspot.net

      Language: English - Date: 2016-07-12 16:36:30
      726Internet privacy / Statistical theory / Cryptographic software / Degree of anonymity / Crypto-anarchism / Crowds / Anonymity / Philosophy of thermal and statistical physics / Mix network / Entropy / Information theory / Traffic analysis

      Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

      Add to Reading List

      Source URL: www.cyber-ta.org

      Language: English - Date: 2007-02-22 22:56:09
      727Cyberwarfare / Communications in the Republic of Ireland / Information technology management / Telecommunications in the Republic of Ireland / Surveillance / National Cyber Security Centre / NCSC / Computer emergency response team

      Operational Framework NCSC-NL v0 2

      Add to Reading List

      Source URL: www.ncsc.nl

      Language: English - Date: 2013-12-16 07:53:06
      728DARPA / Visualization

      The number of professional jobs that require working across collections of documents and data continues to grow, from social media marketing through cyber security to health and wellness. Many of these new jobs contain u

      Add to Reading List

      Source URL: mmds-data.org

      Language: English - Date: 2016-06-23 15:50:48
      729

      Cyber Risk Eigenschaden by Hiscox Bedingungenfür Onlineshops Cyber Risk Eigenschaden by Hiscox Bedingungenfür Onlineshops

      Add to Reading List

      Source URL: www.hiscox.de

      Language: German - Date: 2016-05-17 03:48:59
        730National security / Crime prevention / Cryptography / Information governance / Computer security / PricewaterhouseCoopers / Cyber-attack / Information security

        Assuming a state of compromise.

        Add to Reading List

        Source URL: www.imf-conference.org

        Language: English - Date: 2014-05-21 12:58:41
        UPDATE