Cyberwarfare

Results: 11990



#Item
711Technology / Computer network security / Computer crimes / Rogue software / Spyware / Social engineering / Pharming / Dumpster diving / Phishing / Espionage / Malware / Cyberwarfare

Glossary of Common Terms This is a listing of some of the key words, concepts and slang used to describe identity crimes and the tools/techniques used by perpetrators. The language of identity crimes changes often as per

Add to Reading List

Source URL: www.theiacp.org

Language: English - Date: 2014-02-04 08:47:54
712Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
713Cyberwarfare / Hacker / Electronics / Embedded system / Computing / Hacking / Computer programming

A DIGITAL CITIZENS ALLIANCE REPORT BY GARTH BRUEN OUT OF CONTROL: THE THREAT OF CAR HACKING

Add to Reading List

Source URL: media.digitalcitizensactionalliance.org

Language: English - Date: 2013-12-23 10:46:14
714Computer crimes / Cyberwarfare / Melissa Hathaway / Internet-related prefixes / Cyberspace / War / Military science / Crime / Electronic warfare / Hacking / Military technology

Understanding the Dynamics of Cyber International Relations Project Team Nazli Choucri (PI), David D. Clark, Roger Hurwitz, Daniel Goldsmith, Stuart Madnick, John C. Mallery, Silvio Micali, Michael Siegel, Patrick H. Win

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2010-10-07 14:21:20
715Cyberwarfare / Crime prevention / National security / Data security / Information security / Vulnerability / Threat / Penetration test / Security engineering / Security / Computer security / Computer network security

Microsoft Word - Document7

Add to Reading List

Source URL: iet.ucdavis.edu

Language: English - Date: 2015-05-11 13:14:38
716Conservation biology / Philosophy of biology / Target Corporation / Threat / Stress / Cyberwarfare / Biology / Computer security / Conservation

Sample Formatted Keys for Miradi Figures Key Strategy Intermediate Result Conservation Target

Add to Reading List

Source URL: www.miradi.org

Language: English
717Cyberwarfare / Electronic commerce / Crime prevention / National security / Threat / Governance /  risk management /  and compliance / Intelligence analysis management / Computer network security / Security / Computer security

Social Media Watch Social media has become an indispensable marketing, communications, and customer service tool for millions of organizations around the world. However, social media can also expose organizations to secu

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 22:09:52
718Cyberwarfare / Computer network security / Cyber security standards / SCADA / Certification / Technology / Security / Computer security

Cyber Security Certification Becomes a Focus of Process Security October 01, 2010 Digital infrastructure is at the heart of all process activities these days. And while the industries involved may differ, they are all de

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
719Substitution cipher / Code / Q / Science / Mathematical sciences / Cyberwarfare / Vigenère cipher / Caesar cipher / Cryptography / Classical cipher / Cipher

Using Python To Break Basic Ciphers: Hill Climbing Algorithms John Hackett

Add to Reading List

Source URL: www.hanginghyena.com

Language: English - Date: 2013-12-25 00:18:34
720Security / Trade secrets / Corporate crime / Industrial espionage / Counterintelligence / Secretaría de Inteligencia / Foreign Intelligence Service / General Intelligence and Security Service / Intelligence agency / Espionage / Cyberwarfare / National security

Reto Klar/AP/SIPA The threat of state-sponsored industrial espionage

Add to Reading List

Source URL: www.iss.europa.eu

Language: English - Date: 2015-06-05 08:42:24
UPDATE