Cyberwarfare

Results: 11990



#Item
1

Research Project AmSt 507 Ethics of US CyberWarfare Research Questions: The newest battlefield on planet Earth is in cyberspace. How does this change the rules of international warfare? Territo

Add to Reading List

Source URL: amst507.weebly.com

Language: English - Date: 2013-05-04 23:15:48
    2Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Badge / Pittsburgh International Airport

    Lost/ Stolen Badge and Hangtag Report Lost/Stolen Airport Restricted Access Media and Hangtags shall be promptly reported to the Department of Public Safety and Operations and will be replaced only after the person to wh

    Add to Reading List

    Source URL: www.jmaasecurity.com

    Language: English - Date: 2013-07-09 16:29:00
    3Software / Identity theft / Computing / Cyberwarfare / Rogue software / Cybercrime / Social engineering / Proprietary software / Pop-up ad / Phishing / Spyware / Button

    PROCEEDINGS of the HUMAN FACTORS AND ERGONOMICS SOCIETY 52nd ANNUAL MEETING—Failure to Recognize Fake Internet Popup Warning Messages David Sharek, Cameron Swofford, and Michael Wogalter

    Add to Reading List

    Source URL: www.safetyhumanfactors.org

    Language: English - Date: 2011-12-09 14:58:49
    4Security / Cyberwarfare / Computer security / Computer network security / Cryptography / National security / Secure communication / International Multilateral Partnership Against Cyber Threats

    Press Release Connected Vehicle Cybersecurity Creates Risks and Opportunities in Automotive Market, According to VDC Research Carmakers finally coming to grips with security threats, but still have a long road ahead. The

    Add to Reading List

    Source URL: www.vdcresearch.com

    Language: English - Date: 2016-03-03 10:07:18
    5Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

    JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

    Add to Reading List

    Source URL: comitemaritime.org

    Language: English - Date: 2015-09-14 04:38:33
    6Computer security / Security / Cyberwarfare / Computer network security / Data security / E-commerce / Security controls / Vulnerability / Cyber security standards / Supply chain attack

    GE Oil & Gas Cyber Security Solutions for Industrial Controls OVERVIEW

    Add to Reading List

    Source URL: www.geoilandgas.com

    Language: English - Date: 2016-08-09 11:53:34
    7Security / Computer network security / Cyberwarfare / Geographic information system / Goddard Space Flight Center / Computer security / Database

    THE EVOLUTION OF DOMESTIC INFORMATION DISPLAY SYSTEMS: TOWARD A GOVERNMENT PUBLIC INFORMATION NETWORK Edward K. Zimmerman National Telecommunications &

    Add to Reading List

    Source URL: mapcontext.com

    Language: English - Date: 2008-08-29 23:31:17
    8System software / Software / Computer architecture / Boot loaders / BIOS / Booting / Cyberwarfare / Windows Vista / Rootkit / Windows Vista startup process / Reboot / Computer security

    REboot: Bootkits Revisited Bootkit Basics State of the art REboot

    Add to Reading List

    Source URL: esec-lab.sogeti.com

    Language: English - Date: 2016-07-01 12:08:46
    9Cyberwarfare / Computer security / Computing / Security / Cybercrime / National security / Computer network security / NIST Cybersecurity Framework / International Multilateral Partnership Against Cyber Threats / Commission on Enhancing National Cybersecurity / Cyber-security regulation / National Cybersecurity Center of Excellence

    Commission on Enhancing National Cybersecurity MayNYC Meeting minutes

    Add to Reading List

    Source URL: nist.gov

    Language: English - Date: 2016-06-28 10:05:51
    10Security / Computer security / Computer network security / Crime prevention / Cryptography / Cyberwarfare / National security / Netnod / European Union Agency for Network and Information Security

    PDF Document

    Add to Reading List

    Source URL: nlnetlabs.nl

    Language: English - Date: 2010-05-04 08:06:26
    UPDATE