Cyberspace

Results: 2446



#Item
791Military / War / Hacking / Military technology / Cyber / Internet-related prefixes / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Cyber Command / Military science / Electronic warfare / Cyberwarfare

Cyber Primer Cyber Primer The Cyber Primer, dated December 2013, is promulgated as directed by the Joint Force Commander and Chiefs of Staff

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-10-03 13:18:11
792Internet standards / Internet Protocol / IP fragmentation / IPv4 / IPv6 / Ip / IPv6 packet / Maximum transmission unit / Transmission Control Protocol / Network architecture / Internet / Computing

ATTACKING IPV6 IMPLEMENTATION USING FRAGMENTATION Antonios Atlasis, Centre for Strategic Cyberspace + Security Science

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:32:05
793Hacking / Military technology / Public safety / War / Computer security / United States Department of Homeland Security / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Cyberwarfare / Electronic warfare

MarchMichigan Cyber Initiative Newsletter Articles of Interest Investing in Endpoint Security

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2015-03-02 12:07:01
794Federated identity / Computer network security / Abstraction / Identity assurance / Digital identity / National Strategy for Trusted Identities in Cyberspace / Security / Identity management / Identity / Computer security

st London 1 November 2012 Press Release

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
795Medical privacy / Internet privacy / Privacy International / Privacy policy / Privacy / Ethics / Information privacy

1 st Asian Privacy Laws Symposium 3 & 4 March 2010 Outline for participants The Cyberspace Law & Policy Centre at UNSW Faculty of Law in Sydney will host an academic Symposium on Asian Privacy Laws on 3 & 4 March 2010, p

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2011-07-25 21:19:56
796Computing / Cyberspace / Security / Computer network security / Firewall / Stateful firewall

GUUG FrühjahrsfachgesprächFIREWALLMANAGEMENT OHNE KOPFSCHMERZEN CC-BY-SA

Add to Reading List

Source URL: www.guug.de

Language: English - Date: 2015-04-05 10:12:20
797Sociology / Direct democracy / Digital divide / Internet governance / Virtual reality / E-democracy / Cyberspace / Electronic voting / Online consultation / Technology / Information society / Politics

Frontiers in Science: 2011; 1(1): 5-15 DOI: j.fsCyberdemocracy as a Future Product of Political Systems Engineering Andrzej Kaczmarczyk

Add to Reading List

Source URL: article.sapub.org

Language: English - Date: 2011-12-21 11:35:24
798Computer crimes / National security / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Booz Allen Hamilton / Computer security / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Security / Public safety / Cyberwarfare

Cybersecurity: Mission Integration to Protect your Assets

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-26 01:25:57
799Pornography law / Censorship / Anonymity / Computer law / Pseudonymity / Freedom of speech in the United States / Communications Decency Act / Reno v. American Civil Liberties Union / American Civil Liberties Union / Ethics / First Amendment to the United States Constitution / Law

Nameless in Cyberspace Anonymity on the Internet by Jonathan D. Wallace No. 54

Add to Reading List

Source URL: www.computorney.com

Language: English - Date: 2004-10-10 22:14:02
800Denial-of-service attack / Cyberspace / Internet security / SYN flood / Stefan Savage / Denial-of-service attacks / Computer network security / Computing

A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms Jelena Mirkovic, Janice Martin and Peter Reiher Computer Science Department University of California, Los Angeles Technical report #020018

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2002-05-01 03:16:24
UPDATE