Cyberwarfare

Results: 11990



#Item
901Electronic warfare / Hacking / Military technology / Computer security / United States Department of Homeland Security / Idaho / Idaho National Laboratory / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Public safety / Cyberwarfare

2014 Annual ACSC Conference LEFT OF BOOM How and Where to Invest Across the Kill Chain

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2014-12-30 11:22:29
902Cyberwarfare / Firewall / Internet security / Network security / Transmission Control Protocol / Deep packet inspection / Network address translation / Internet protocol suite / SCADA / Computer network security / Computing / Network architecture

2011 BlackRidge Technology Transport Access Control: Overview

Add to Reading List

Source URL: blackridge.us

Language: English - Date: 2012-07-25 14:33:36
903Computer security / Secure communication / Crime prevention / National security / Malware / Crimeware / Phishing / Threat / Data breach / Security / Cyberwarfare / Computer network security

2015 DBIR Contributors (See Appendix C for a detailed list.) i

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-05-26 10:55:19
904Computer virus / International Cryptology Conference / Antivirus software / Computer worm / Cyberwarfare / Computer security / Science / Cryptography / Malware / Cryptovirology

Cryptovirology A matter of precision A matter of time A matter of stealth Last words

Add to Reading List

Source URL: www.quarkslab.com

Language: English - Date: 2013-07-15 08:52:43
905Intelligence / Military intelligence / Cyberwarfare / Double agent / KGB / Counterintelligence / Central Intelligence Agency / Foreign Intelligence Service / Mole / Espionage / National security / Data collection

GLOSSARY OF TERMS LANGUAGE OF ESPIONAGE The shadow world has inspired — and mandated — a vivid vocabulary of words and codenames for secret operations, missions and agents. These words are carefully chosen to clarify

Add to Reading List

Source URL: www.powerhousemuseum.com

Language: English - Date: 2012-10-22 00:33:31
906Military technology / War / Military science / Legal aspects of computing / Observer Research Foundation / Cyber-security regulation / Electronics / Melissa Hathaway / Department of Defense Cyber Crime Center / Cyberwarfare / Electronic warfare / Hacking

EVENT PARTNERS SPONSORS KNOWLEDGE PARTNERS

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2014-10-06 04:48:13
907International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Terrorism / Cyberterrorism / Criminology / Computer crimes / Cyberwarfare / Crime

CAMINO is the Coordination and Support Action entitled ‘Comprehensive Approach to cyber roadMap coordINation and develOpment’, a European research project in the security

Add to Reading List

Source URL: www.fp7-camino.eu

Language: English - Date: 2015-05-15 08:07:01
908Computer network security / Computer networking / Cyberwarfare / Data security / Firewall / Packet Processing / Netfilter / Network address translation / Traffic flow / Computing / Network architecture / System software

OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-07-07 17:03:14
909Internet / Denial-of-service attacks / Cyberwarfare / Spamming / Multi-agent systems / Denial-of-service attack / Botnet / Smurf attack / Anycast / Computer network security / Computing / Network architecture

CHAPTER 21 Network Attack and Defense Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:53:46
910Computer network security / Software testing / Crime prevention / National security / Vulnerability / Information security / Penetration test / Countermeasure / Social vulnerability / Security / Computer security / Cyberwarfare

Basic Training Editors: Richard Ford, Deborah Frincke, Ethics in Security Vulnerability Research

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
UPDATE