Cyberwarfare

Results: 11990



#Item
881Cyberwarfare / Windows / Windows Server / Vulnerability / Patch / Windows Metafile vulnerability / Patch Tuesday / Microsoft Windows / Computer security / Computing

Microsoft Word - USDHSalert

Add to Reading List

Source URL: www.rwau.net

Language: English - Date: 2015-02-11 16:34:06
882Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncsc.gov

Language: English - Date: 2012-05-15 07:38:22
883Computing / Cyberwarfare / Security / Application firewall / Distributed firewall / Computer network security / Firewall / Network security

State of New Mexico Statewide Architectural Configuration Requirement Title: Firewall Functionality Standard N-STD004.001 Effective Date: October 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:08
884Surveillance / Signals intelligence / TEMPEST / United States government secrecy / Cyberwarfare / Side channel attack / Power analysis / Electromagnetic interference / Shielded cable / Espionage / National security / Security

CHAPTER 17 Emission Security The hum of either army stilly sounds, That the fixed sentinels almost receive

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:50:25
885Security token / Virtual private network / Universal Serial Bus / Cyberwarfare / Computer network security / Computing / Computer security

Name of the Document Classification General Version 1.0

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-05-22 06:30:26
886Cryptography / Applied mathematics / Quantum information science / Quantum cryptography / Cyberwarfare / Security / Quantum mechanics / Quantum money / Public-key cryptography

New constructions for Quantum Money Iordanis Kerenidis CNRS-Univ Paris Diderot joint work with Marios Georgiou

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-03-25 23:26:32
887Hacking / Military technology / Nuclear Regulatory Commission / Nuclear technology / Safety / Energy / Nuclear energy in the United States / Cyberwarfare / Electronic warfare

Microsoft PowerPoint - USCG Public Meeting NRC Cyber presentation in 16x9 resolution.pptx

Add to Reading List

Source URL: www.n-b-f.org

Language: English - Date: 2015-02-25 15:51:12
888Cross-site request forgery / OWASP / Cross-site scripting / Computer security / Cyberwarfare / Security

Ghosts  of  XSS  Past,  Present   and  Future.       Jim  Manico  

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 17:07:30
889Vulnerability / Psychological resilience / Understanding / Cyberwarfare / Failure / Software testing / Computer security / Hacking

The Hayward Shoreline Resilience Study is building on the outcomes of ART Adapting to Rising Tides project subregional project and refining vulnerabilities, risks, and adaptation actions for sea www.adaptingtorisingtides

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2014-08-07 14:12:28
890Computer network security / Software testing / Crime prevention / National security / Vulnerability / Counterintelligence / Threat model / Information security / Penetration test / Computer security / Security / Cyberwarfare

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2014-10-09 09:28:35
UPDATE