Cyber-security regulation

Results: 835



#Item
461Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / International Cybercrime / Government / Library of Congress / Cyberwarfare

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-22 19:59:59
462Technology / Cyber-security regulation / International Telecommunication Union / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / International Cybercrime / Cyberwarfare / Security / Computer security

DOCX Document

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2014-02-19 08:56:31
463Computer security / United States Department of Homeland Security / National Cybersecurity Center / Comprehensive National Cybersecurity Initiative / Howard Schmidt / Cyber-security regulation / Critical infrastructure protection / United States Computer Emergency Readiness Team / United States National Security Council / National security / Cyberwarfare / Security

Who Should Lead U.S. Cybersecurity Efforts? By Kevin P. Newmeyer

Add to Reading List

Source URL: cco.dodlive.mil

Language: English - Date: 2014-02-13 14:35:47
464United States Department of Homeland Security / Computer crimes / Critical infrastructure protection / Infrastructure / Security engineering / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / Internet kill switch / National security / Security / Public safety

PDF Document

Add to Reading List

Source URL: www.pclob.gov

Language: English - Date: 2014-08-08 12:31:58
465Crime prevention / Computer security / Actuarial science / TRAC / Risk management / Information security / United States Department of Homeland Security / National Cyber Security Division / Cyber-security regulation / Security / Public safety / National security

the evolving governance Model for CYBERSECURITY RISK  By Gary owen, Director, Promontory Financial Group

Add to Reading List

Source URL: www.promontory.com

Language: English - Date: 2014-08-01 16:52:19
466Cyberwarfare / Counter-intelligence / Intelligence analysis / Military intelligence / Counterintelligence / Computer security / Cyber-security regulation / Espionage / Security / National security

Remarks by the National Counterintelligence Executive Dr. Joel F. Brenner Applied Research Laboratories University of Texas at Austin Business Strategies in Cyber Security and Counterintelligence April 3, 2009

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2012-07-27 11:39:53
467Cyberwarfare / Technology / Electronics / United States Department of Homeland Security / Military technology / Military science / Cyber-security regulation / Radar / Raytheon / AFCEA

Jeffrey Snyder bio April 2013

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2014-09-29 04:32:13
468Public safety / Computer crimes / United States Department of Homeland Security / Crime prevention / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberterrorism / Information security / Cyber-security regulation / Security / Cyberwarfare / National security

National Cyber Security Policy (draft v1

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2014-08-19 05:12:05
469Hacking / United States Department of Homeland Security / Military / Net-centric / United States Cyber Command / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Department of Defense Cyber Crime Center / Cyberwarfare / Computer crimes / Military science

August[removed]Defense Horizons National Defense University David J. Kay is a Research Analyst

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2014-03-06 11:49:14
470War / Cyberterrorism / Legal aspects of computing / Cyber-security regulation / Department of Defense Cyber Crime Center / Cyberwarfare / Security / Computer security

XII five-year plan on information technology sector Report of Sub-Group on Cyber Security 1.0 Background Over the years, Information Technology has transformed the global economy and connected

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2014-08-19 05:19:10
UPDATE