Defense Information Systems Network

Results: 153



#Item
21Deep packet inspection / Videotelephony / Security information and event management / Network security / Electronics / Virtual LAN / Security event manager / Cisco Career Certifications / Cisco IOS / Computer security / Computing / Cisco Systems

Cisco ISE Plus SIEM and Threat Defense: Strengthen Security with Context

Add to Reading List

Source URL: www.cisco.com

Language: English
22Information technology management / Netflow / Cisco Systems / System administration / NX-OS / Network traffic measurement / Plixer International / System software / Computing / Network management

Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design Last Updated: March 3, 2014 About the Authors

Add to Reading List

Source URL: www.cisco.com

Language: English
23Network management / Netflow / Cisco Systems / Network security / Cisco Catalyst / Traffic flow / Cisco Security Monitoring /  Analysis /  and Response System / Network traffic measurement / Computing / System software / Information technology management

Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn

Add to Reading List

Source URL: www.cisco.com

Language: English
24Computer network security / Public safety / Data security / Computer security / Information security / Network security / Microsoft Security Essentials / Organizational Systems Security Analyst / Defense in depth / Security / Crime prevention / National security

Information security Information security specialists ensure the security of Queensland Government information and systems. They are responsible for the investigation of unauthorised access to ICT facilities, security br

Add to Reading List

Source URL: www.qgcio.qld.gov.au

Language: English - Date: 2015-03-17 20:36:18
25Systems science / Occupations / Systems engineering / Simulation / Information systems / Knowledge / Embedded system / Wireless sensor network / Scientific modelling / Science / Cybernetics / Systems theory

Microsoft Word - Inscription Délégations AeroSpaceDays & Defense 2014 ENG.doc

Add to Reading List

Source URL: www.defencesecuritydays.com

Language: English - Date: 2014-12-11 03:52:16
26Occupations / Systems engineering / Simulation / Science / Embedded system / Information systems / System / Wireless sensor network / Technology / Cybernetics / Systems theory / Systems science

Microsoft Word - Inscription Fournisseurs AeroSpaceDays & Defense 2014 ENG.doc

Add to Reading List

Source URL: www.defencesecuritydays.com

Language: English - Date: 2014-12-11 03:52:16
27Interoperability / Accreditation / Electronics / Computing / Avaya / Technology / DoD IPv6 Product Certification / Joint Interoperability Test Command / Defense Information Systems Agency / Defense Switched Network

Microsoft Word - erd_upfiles_26720_XOP_USN_TN0830801_IO_Cert_FINAL.doc

Add to Reading List

Source URL: www.xopnetworks.com

Language: English - Date: 2012-01-11 01:32:56
28Military communications / Computing / Defense Switched Network / Accreditation / Interoperability / System under test / Certification / Electronics / Technology / Quality assurance / Joint Interoperability Test Command / Defense Information Systems Agency

Microsoft Word - XOP_USN_TN0830801_IO_Cert_DTR2 FINAL3_jts

Add to Reading List

Source URL: jitc.fhu.disa.mil

Language: English - Date: 2012-06-19 23:20:33
29Tenable Network Security / Nessus / Information assurance vulnerability alert / Defense Information Systems Agency / Security Content Automation Protocol / Vulnerability management / Federal Information Security Management Act / Vulnerability scanner / Vulnerability / Computer security / Cyberwarfare / Computing

| CASE STUDY Tenable Delivers Best-of-Breed Configuration Compliance and Vulnerability Management for U.S. Department of Defense

Add to Reading List

Source URL: www.tenable.com

Language: English - Date: 2013-08-22 14:20:24
30Software testing / Computer network security / Information technology audit / Global Information Assurance Certification / SANS Institute / Penetration test / Department of Defense Cyber Crime Center / Malware / Certified Information Systems Security Professional / Computer security / Cyberwarfare / Computing

THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Baltimore 2014 Baltimore, MD September 22-27

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-23 10:39:59
UPDATE