Cyberwarfare

Results: 11990



#Item
921Root certificate / Public key certificate / Security / Computer security / Certificate authority / Public-key cryptography / Key management / Cyberwarfare

Name of the Document Installing CA Root Certificates and User Digital Certificate Platform

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2013-03-07 01:21:56
922Military technology / International security / International relations / Science / Foreign relations of India / Cyberwarfare / Electronic warfare / Hacking

Microsoft WordRede_BMin_Neu_Delhi_ENG_final_fliesstext.docx

Add to Reading List

Source URL: orfonline.org

Language: English - Date: 2015-05-27 08:43:52
923Computer network security / Crime prevention / National security / Vulnerability / Threat / IT risk / Managed security service / Security / Computer security / Cyberwarfare

FEATURE MINDANAOIndustrial Security Management BY LACHLAN MCCONNELL T

Add to Reading List

Source URL: www.osi.com.ph

Language: English - Date: 2014-01-11 04:16:42
924Cyberwarfare / DARPA / Computer security / National Security Agency / United States Department of Homeland Security / Multics / Melissa Hathaway / National Institutes of Health / Rainbow Series / Security / National security / Government

History of US Government Investments in Cybersecurity Research A Personal Perspective Carl E. Landwehr Institute for Systems Research University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:48
925Computer security / Vulnerability / Threat / Countermeasure / Emergency management / Computer network security / Security / Cyberwarfare

Transit System Security Overview: Participants are trained to reduce and eliminate risk, threat, and vulnerability of their patrons, employee, and the physical facilities of bus and rail systems. Elements of the course:

Add to Reading List

Source URL: mtweb.mtsu.edu

Language: English - Date: 2010-11-10 11:20:58
926Computer network security / W3af / Metasploit Project / Rapid7 / Penetration test / Web application security / Exploit / Application security / OWASP / Computer security / Cyberwarfare / Software

Web Application Security Payloads Andrés Riancho Director of Web Security OWASP AppSec USAMinneapolis Topics

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:10:56
927Cyberwarfare / Network security / Firewall / Proxy server / Intranet / Vulnerability / Distributed firewall / Internet security / Computer network security / Computing / Computer security

Security Issues in Networks with Internet Access CARL E. LANDWEHR, MEMBER, IEEE, AND DAVID M. GOLDSCHLAG 1

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:40
928Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
929Battelle Memorial Institute / United States Department of Energy National Laboratories / Stuxnet / Lawrence Livermore National Laboratory / Computer security / FLOPS / Internet privacy / Privacy / Blue Gene / Computing / Parallel computing / Cyberwarfare

COMPUTER SCIENCE JAN.29 FORTY-SECOND SERIES SPRING 2015

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2015-01-23 16:27:18
930Actuarial science / Public safety / Computer crimes / Cyberwarfare / Hacking / Military technology / Operational risk / Computer security / Bank / Security / Ethics / Risk

Speech at The Clearing House’s First Annual Operational Risk Colloquium, February 11, 2015

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2015-06-04 01:21:54
UPDATE