Cyberwarfare

Results: 11990



#Item
761Security / Computer network security / Software testing / Electronic commerce / Vulnerability / Hacking / Cyberwarfare / Computer security

Sensus Selects Achilles To Test FlexNet AMI Products July 12, 2010 As advanced metering and smart grid infrastructure suppliers rapidly roll-out new feature and functionality to meet the evolving needs of global utilitie

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:13
762Electronic commerce / Siemens / Computer security / Cyberwarfare / Technology / Security / Computer network security

Siemens Selects Achilles July 12, 2010 The Wurldtech communications team is pleased to announce that Siemens has selected the Achilles Satellite to enhance internal robustness testing best practices for its range of indu

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
763Espionage / Cipher / Bletchley Park / Alberti cipher disk / Banburismus / Cyberwarfare / Cryptography / Cipher disk

A new approach to revealing the Byrne machine. Introduction. Up until now the methodology used has been to statistically analyse the plain and ciphertexts provided by Byrne and from that to draw conclusions on how the ma

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2009-09-02 13:29:47
764Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

Microsoft Word - tcm_taxonomy_submission.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
765Security / Hacking / Software testing / Internet of Things / Vulnerability / Attack / Internet / Computer network security / Cyberwarfare / Computer security

IoT and M2M Opportunity Matthew Johnson CTO Guardtime Gartner definition:

Add to Reading List

Source URL: industry40.ee

Language: English - Date: 2015-05-15 05:46:47
766Computer science / Applied mathematics / Simulation / Dev / Advanced persistent threat / Cyberwarfare / Computer security / SP-DEVS / Finite & Deterministic Discrete Event System Specification / Automata theory / DEVS / Security

Poster: Modeling of APT Attacks through Transforming Attack Scenarios into DEVS Models Jiyeon Kim Hyung-Jong Kim

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:45
767Ethics / Crime / Security / Hacking / Military technology / Legal aspects of computing / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Cyberethics / Computer crimes / Computer law / Cyberspace

ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION

Add to Reading List

Source URL: www.cio.co.ke

Language: English - Date: 2015-07-19 09:52:38
768Electronic warfare / Hacking / Military technology / SCADA / Telemetry / Stuxnet / Computer security / Critical infrastructure protection / Cyberwarfare in the United States / Technology / Cyberwarfare / Security

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 19:30:32
769Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-05 12:00:46
770Public safety / Government / National security / National Cyber Security Division / National Protection and Programs Directorate / United States Department of Homeland Security / National Communications System / Cyberwarfare

Office of Cybersecurity & Communications U.S. Department of Homeland Security Michael Echols Director, Joint Program Management Office

Add to Reading List

Source URL: travelers.http.internapcdn.net

Language: English - Date: 2014-11-06 12:13:58
UPDATE