Cyberwarfare

Results: 11990



#Item
811Computer security / Security / Cyberwarfare / Risk / Social vulnerability / Vulnerability

Title: Resource system vulnerabilities to climate variation and change Session: Vulnerable People, Places and Systems Yongyuan Yin*1, Nicholas Clinton2, Xu Zhongming3 and Sun Landong3 1 Adaptation and Impacts Research Gr

Add to Reading List

Source URL: www.start.org

Language: English - Date: 2010-04-05 16:27:04
812Computer security / Crime prevention / National security / Secure communication / Cyber-security regulation / Cloud computing / Computing / International Cybercrime / Cyberwarfare / Security / Computer network security

STUMBLING BLOCKS IN THE PATH TO TRUE SECURITY Some governments today are invoking cybersecurity as a justification for a variety of policies that go beyond what is needed to address legitimate security concerns. In fact,

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-03-06 14:56:48
813Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:48
814Hacking / War / Advanced persistent threat / Military technology / Securitate / Malware / Computer insecurity / Zero-day attack / Security / Cyberwarfare / Electronic warfare

Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

Add to Reading List

Source URL: cyberisks.ro

Language: English - Date: 2014-10-10 03:40:58
815Crime prevention / National security / Internet privacy / Intrusion detection system / Cyberwarfare / Computer virus / Computer security / Antivirus software / Privacy / Security / Computer network security / Ethics

Review of New Security Paradigms 2002 Workshop Papers By Christina Serban and Hilary Hosmer The New Security Paradigms Workshop (NSPW) offers researchers a safe, constructive environment to explore radical rather than ev

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2002-11-16 13:14:38
816Firewall / Computer security / Network security / IP address / Computing / Network architecture / Comparison of firewalls / Windows Firewall / Computer network security / Cyberwarfare / Data security

Registration Worksheet The following is required to register your product in the GTA Online Support Center (http://www.gta.com/support/center). Serial Number Activation Code

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-12-06 11:43:14
817Hacking / Computer network security / Crime prevention / National security / Software assurance / Center for Strategic and International Studies / Attack / Canadian Security Intelligence Service / Information security / Security / Cyberwarfare / Computer security

CSIS Report Foreign Influence on Software Risks and Recourse

Add to Reading List

Source URL: csistechpolicy.net

Language: English - Date: 2014-08-22 14:15:54
818Computer security / Antivirus software / Client honeypot / Malware / Rogue software / Gumblar / HoneyMonkey / JavaScript / World Wide Web / Computing / Computer network security / Cyberwarfare

BadSignal-Reputation-bar.eps

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-05-25 21:19:32
819Public safety / Computer network security / Electronic commerce / Crime prevention / National security / Information security / Password / Cloud computing security / Access control / Security / Computer security / Cyberwarfare

Access Security Requirements

Add to Reading List

Source URL: checkpointscreening.com

Language: English - Date: 2015-03-09 19:01:58
820Cyberwarfare / Crime prevention / National security / Data security / Software testing / Malware / Information security / Certified Information Systems Security Professional / Vulnerability / Security / Computer security / Computer network security

Security Specialist Summary: BATS, one of the largest U.S. equities market center, is actively seeking a Security Specialist. Location: New York, NY Responsibilities  

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2015-05-28 14:59:04
UPDATE