Cyberwarfare

Results: 11990



#Item
951Public safety / War / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / Computer security / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Security / Cyberwarfare / Computer crimes

2013 Annual ACSC Conference Cyber Security Threat Sharing: A Roadmap for Collaborative Defense Charlie Benway

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2013-12-05 12:45:22
952Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:14
953Cyberwarfare / Symantec / Check Point / Network security / Information security / Internet security / Managed security service / Wireless security / Intel / Computer network security / Computer security / Computing

Security Report December 30, 2002 IT Security Sector Monthly Report December 2002

Add to Reading List

Source URL: signalhill.in

Language: English - Date: 2013-09-25 15:28:43
954Software licenses / Computing / Computer law / Software testing / Software quality / Open-source software / Proprietary software / Vulnerability / Software development process / Computer security / Computer network security / Cyberwarfare

Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security Carl E. Landwehr Institute for Systems Research University of Maryland, College Park Abstract:

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
955Cyberwarfare / Pension Benefit Guaranty Corporation / Vulnerability / Penetration test / Pension / Financial economics / Charles E.F. Millard / Software testing / Computer security / Inspector General

Pen nsion Benefit B Guaran G nty Corrporatio

Add to Reading List

Source URL: oig.pbgc.gov

Language: English - Date: 2015-04-02 11:44:39
956Multiplexing / Radio resource management / Military communications / Cyberwarfare / Military technology / Electronic counter-countermeasures / Spread spectrum / Electronic warfare / Frequency-hopping spread spectrum / Telecommunications engineering / Military science / OSI protocols

Chapter 16: Electronic and Information Warfare C H A P TE R 16 Electronic and Information

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-09-07 03:18:44
957Computing / Software testing / Hacking / Vulnerability / Full disclosure / CVSS / Responsible disclosure / Symantec / Patch / Computer security / Cyberwarfare / Computer network security

Responsible Vulnerability Disclosure Zoltán Précsényi Sr Manager Government Affairs EMEA Agenda 1

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:32:13
958Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:37
959Crime prevention / Surveillance / Mass surveillance / Lawful interception / Intelligence Bureau / Telephone tapping / Cyberwarfare / National security / Security / Law enforcement

Security, Surveillance and Data Sharing Schemes and Bodies in India - By Maria Xynou and Elonnai Hickok Following the 2008 Mumbai terrorist attacks, India had implemented a wide range of data sharing and surveillance sch

Add to Reading List

Source URL: cis-india.org

Language: English
960Computer security / Crime prevention / National security / Database security / Application security / Vulnerability / Network security / Information security audit / CompTIA / Security / Cyberwarfare / Computer network security

Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:25:48
UPDATE