Cyberwarfare

Results: 11990



#Item
721Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Æ / Linguistics / Cyberwarfare / Security / Computer network security

Microsoft PowerPoint - Dunn_revised+final.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:09
722Computer security / Cyberwarfare / Computer network security / Security / Firewall

Wurldtech Provides Sneak Peek Of First AchillesINSIDE Product September 29, 2010 Investigation is better than inertia. So while a wall that just sits there offers some protection, a barrier that also examines and evaluat

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
723Security / Critical infrastructure / Action / Computing / Computer security / Cyberwarfare / Cyber security standards

WIB Working Group Selects Dr. Kube for Subject Matter Expert January 13, 2009 Wurldtech Expands Leadership Position In International Standards Efforts & Industry Working Groups To Drive Cyber Security Improvements Throug

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:13
724Computer network security / Hacking / National security / Vulnerability / Advanced persistent threat / Attack / Stuxnet / Cyberwarfare / Computer security / Security

IBM’s Cyber Security Perspective Martin Borrett, Director of the IBM Institute for Advanced Security, Europe © 2011 IBM Corporation IBM’s Definition of Cyber Security

Add to Reading List

Source URL: www.infowar.it

Language: English - Date: 2011-11-22 08:27:22
725Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
726Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
727Cyberwarfare / Public safety / War / Fusion center / National Cyber Security Division / Department of Defense Cyber Crime Center / Computer crimes / United States Department of Homeland Security / National security

global logo with tex black centeredt

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-05-29 10:29:33
728Cyberwarfare / Computer network security / Computer security / Secure communication / Critical infrastructure protection / National Cyber Security Division / International Cybercrime / National security / Security / United States Department of Homeland Security

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS The cybersecurity maturity has been assessed against 25 criteria across five themes. Each of the criteria are given a “Yes”, “No”, “Partial”, or “Not A

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:29
729Computer security / Data security / Secure communication / National security / Data breach / Malware / Identity theft / Internet privacy / Personally identifiable information / Security / Computer network security / Cyberwarfare

Hiscox Reinsurance logo

Add to Reading List

Source URL: www.hiscoxbroker.com

Language: English - Date: 2015-07-02 12:19:31
730Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
UPDATE