Cyber

Results: 13321



#Item
921

Cyber-security: The vexed question of global rules An independent report on cyber-preparedness around the world

Add to Reading List

Source URL: dennisnadeaucomplaint.com

Language: English - Date: 2015-06-30 19:20:09
    922Cyberwarfare / Actuarial science / Financial regulation / International finance institutions / Systemic risk / International Organization of Securities Commissions / Risk management / Computer security / Global financial system / Enterprise risk management / Derivative / Cyber-security regulation

    EBF, GFMA and ISDA Publish Principles to Promote Effective Global Policy on Cybersecurity, Data and Technology

    Add to Reading List

    Source URL: www.ebf-fbe.eu

    Language: English - Date: 2016-05-10 04:10:04
    923

    ‫ראש‬ ‫הממשלה‬ ‫נתניהו‪,‬‬

    Add to Reading List

    Source URL: cyber.cswp.cs.technion.ac.il

    Language: Hebrew - Date: 2016-04-05 02:34:41
      924Wireless networking / Computing / Wireless / Routing algorithms / Technology / Computer networking / Routing / Wireless sensor network / Wireless mesh network / Source routing / Wi-Fi / DBm

      Wireless Routing and Control: a Cyber-Physical Case Study Bo Li1∗, Yehan Ma1∗, Tyler Westenbroek2 , Chengjie Wu1 , Humberto Gonzalez2 , Chenyang Lu1 1 2

      Add to Reading List

      Source URL: www.cse.wustl.edu

      Language: English - Date: 2016-02-16 08:27:42
      925Economy / Business / Management / Manufacturing / Amity University / Lean manufacturing / Supply chain management / Amity / Strategic management / Vasudhara Dairy

      1 International Journal of Strategic Management Amity Education Private Limited. Mind space Building, Cyber city, Ebene, Mauritius ISSN: Print), 1694-268X (Online)

      Add to Reading List

      Source URL: www.amity.edu

      Language: English - Date: 2016-03-10 05:50:53
      926

      National Cyber Security Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior An Industry, Academic and Government Perspective 2009

      Add to Reading List

      Source URL: dennisnadeaucomplaint.com

      Language: English - Date: 2015-06-30 19:19:14
        927

        RED TEAM OPERATIONS. CONFIDENCE RESTORED. Are Your Information Security Investments Performing? Improve risk management through effective cyber defence and preparedness to deal with a real-world attack.

        Add to Reading List

        Source URL: www.cyberdefensemagazine.com

        Language: English - Date: 2016-06-01 17:13:53
          928

          Prioritizing Soft Real-Time Network Traffic in Virtualized Hosts Based on Xen Chong Li, Sisu Xi, Chenyang Lu, Christopher D. Gill, Roch Guerin Cyber-Physical Systems Laboratory Washington University in St. Louis E-mail:

          Add to Reading List

          Source URL: www.cse.wustl.edu

          Language: English - Date: 2015-02-16 22:25:09
            929

            MODUL CYBER LEARNING 2011 DAFTAR ISI BAB I PENDAHULUAN ...................................................................................................................... 6 BAB II MODUL DOSEN .........................

            Add to Reading List

            Source URL: cyberlearning.unissula.ac.id

            Language: Indonesian - Date: 2016-03-06 23:41:10
              930Cyberwarfare / Federal Information Security Management Act / United States Department of Homeland Security / NIST Cybersecurity Framework / Computer security / Chief information security officer / Cyber-security regulation / National Cybersecurity Center of Excellence

              Review-Doc-2015-ITORdocx

              Add to Reading List

              Source URL: www.whitehouse.gov

              Language: English - Date: 2015-10-30 16:10:53
              UPDATE