Cyberwarfare

Results: 11990



#Item
251Security / Cyberwarfare / Computing / Cryptography / Computer network security / Computer security / Crime prevention / National security / National Security Agency

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36
252Computer network security / Security / Computing / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Appliance / ISCSI / Packet capture appliance

Network Forensics Appliance Diagram

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-01-09 14:49:07
253Computer security / Computing / E-commerce / Cyberwarfare / Software testing / Computer network security / Information privacy / Payment Card Industry Data Security Standard / PA-DSS / Penetration test / Vulnerability / Data security

Microsoft Word - InfoSupp_11_3_PenetrationTesting.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:34
254Cryptography / Security / Prevention / Cyberwarfare / Encryption / Password / Plaintext / Computer security / Device driver / BitLocker / Disk encryption

USBiTC-­‐SPD-­‐001  v0.6     2014-­‐08-­‐29  

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2014-09-22 10:23:37
255Computer security / Computer network security / Cyberwarfare / Software testing / Computing / OWASP / Application security / Penetration test / Vulnerability

Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:33
256Computer security / Computing / Business continuity and disaster recovery / Security / Cyberwarfare / IT risk management / Backup / Data management / National Institute of Standards and Technology / Business continuity planning / Disaster recovery / Business continuity

1 Draft NIST Special Publication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-06 12:06:37
257Computer security / Computing / Security / Data security / Cyberwarfare / Computer network security / ISO/IEC 27002 / Vulnerability / Information security management system / Security controls / Information security / ISO/IEC 27001:2013

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:59
258Computer security / Security / Cyberwarfare / Prevention / Vulnerability / Reliability engineering / Operations security / Systems engineering / Threat / Information assurance / Counterintelligence / Attack

System Security Engineering and Program Protection Integration into SE

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-11-06 08:35:31
259Software / Cyberwarfare / Security / Prevention / Server / Computer security / Denial-of-service attack / Password / EVS / Git

Fireaxe: The DHS Secure Design Competition Pilot [Extended Abstract] Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd,

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:11
260Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / DMZ / Virtual private network / Network switch / Secure Computing Corporation / Firewall

Secure Computing SnapGear™ User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-08-31 03:33:18
UPDATE