Cyber-security regulation

Results: 835



#Item
61International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Organisation for Economic Co-operation and Development / Cyber-security regulation / Computer security / Government / Crime / International Cybercrime / Computer crimes / Cyberwarfare / Security

Microsoft Word - Cybersecurity Policy Making at a Turning Point .docx

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:56:35
62Cyberwarfare / Computer crimes / Electronic warfare / Hacking / Military technology / Cyber-security regulation / United States Department of Homeland Security / National Security Agency / International Multilateral Partnership Against Cyber Threats / Security / National security / Government

HSGAC Cybersec tes 1-27 final

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2015-02-25 11:34:49
63War / Law of the sea / Piracy / Law / Cyberwarfare / Privateer / Letter of marque / Cyber-security regulation / Paris Declaration Respecting Maritime Law / Naval warfare / Maritime history / Privateering

www.politics.ox.ac.uk/centre/cyber-studies-programme.html Working Paper Series - No.1 March 2015

Add to Reading List

Source URL: bruteforce.gr

Language: English - Date: 2015-03-10 19:49:30
64International Telecommunication Union / United States Department of Homeland Security / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / Information Technology Industry Council / Computer security / National Cybersecurity Center / National security / Cyberspace / Cyberwarfare / Security / Computer crimes

Federal Register / Vol. 80, NoThursday, March 19, Notices The meeting will be held on Monday, April 13, 2015, from 1:30 p.m.

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2015-03-19 12:08:23
65United States Department of Homeland Security / Computer security / Privacy / Internet privacy / Cyber-security regulation / National Cyber Security Division / Ethics / Security / Public safety

Statement of Administration Policy on H.RCyber Intelligence Sharing and Protection Act

Add to Reading List

Source URL: www.lawfareblog.com

Language: English - Date: 2012-04-25 15:55:42
66Government / Consumer protection / Corporate crime / FTC Fair Information Practice / Privacy policy / Ethics / Unfairness doctrine / Identity theft / Cyber-security regulation / Federal Trade Commission / Privacy / Law

Case 2:13-cvES-JAD Document 32 FiledPage 1 of 20 PageID:

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2014-10-07 15:45:51
67Computer security / National security / Computer law / Computer crimes / Computer network security / Cyber-security regulation / National Cybersecurity Center / International Multilateral Partnership Against Cyber Threats / National Security Agency / Cyberwarfare / Security / United States Department of Homeland Security

December 13, 2013 Information Technology Laboratory ATTN: Adam Sedgewick National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD

Add to Reading List

Source URL: epic.org

Language: English - Date: 2013-12-13 16:22:08
68Military technology / War / Military science / UC Institute on Global Conflict and Cooperation / International security / Cyber-security regulation / International relations / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Electronic warfare / Hacking

Jon R. Lindsay University of California Institute on Global Conflict and Cooperation 9500 Gilman Drive, Mail Code 0518, La Jolla, CA — ( — www.jonrlindsay.edu

Add to Reading List

Source URL: irps.ucsd.edu

Language: English - Date: 2015-05-27 20:35:29
69International Telecommunication Union / Cyberwarfare / Computer security / Crime / National Cyber Security Division / Cyber-security regulation / Computer crimes / Security / International Multilateral Partnership Against Cyber Threats

CASE STUDY THE NEW FRONTLINE IN CYBER DEFENCE Case Study THE NEW FRONTLINE IN CYBER DEFENCE

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2015-04-10 11:43:59
70Public safety / United States Department of Homeland Security / Computer crimes / Cyber-security regulation / Computer security / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Government

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:16:48
UPDATE