Defense in depth

Results: 65



#Item
41United States Department of Homeland Security / Cyberwarfare / National Cyber Security Division / SCADA / United States Computer Emergency Readiness Team / Computer security / Industrial control system / Technology / Telemetry / Security

Control Systems Security Program Training The Control Systems Security Program (CSSP) training courses and workshops share in-depth defense strategies and up-to-date information on

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2013-04-10 12:29:49
42Data security / Computer network security / Crime prevention / Information security / Information assurance / Defense in depth / Attack / Defense Information Systems Network / National Security Agency / Security / Computer security / National security

Themes and Highlights of the New Security Paradigms Workshop 1999 Panel Chair - Mary Ellen Zurko, Iris Associates Panelists Nathan A. Buchheit, United States Military Academy, Department of Electrical Engineering and Com

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
43Crime prevention / National security / Cyberwarfare / Web portal / Computer security / Portal / Defense in depth / EGovernment in Europe / Computer network security / Security / Data security

Proceedings of the International Conference on Security and Management (SAM’04) - ISBN: [removed]Computer Science Research, Education, and Applications Press, June 21-24, 2004 A Security Architecture for a Web Por

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2013-09-30 15:22:12
44Database management systems / Computer security / Crime prevention / Data security / National Security Agency / Network security / Defense in depth / Emergency management / Cryptography / Computer network security / Security / National security

NSA/DHS CAE in IA/CD[removed]Mandatory Knowledge Unit Checklist – 4 Year+ Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis

Add to Reading List

Source URL: www.cisse.info

Language: English - Date: 2013-10-21 20:46:38
45National security / Computer security / Crime prevention / Data security / Physical security / Defense in depth / Attack / Threat / Access control / Security / Computer network security / Public safety

Microsoft PowerPoint - Security in Depth Webinar.pptx

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2014-03-05 14:20:03
46Measuring instruments / Crime prevention / Privacy / Extremely high frequency / Radio spectrum / Millimeter wave scanner / Active Denial System / Surveillance / Drone / Security / Public safety / Technology

Science and technology for personal defense in depth Michel A. Duguay, 20 July 2014 Department of electrical and computer engineering Laval University, Québec City, Québec, Canada G1V 0A6 e-mail: [removed]

Add to Reading List

Source URL: www.pugwashgroup.ca

Language: English - Date: 2014-07-30 14:58:54
47United States Department of Defense / War in Afghanistan / Afghanistan / Strategic depth / Seth Jones / Arturo Munoz / Military science / RAND Corporation / Santa Monica /  California

CENTER FOR ASIA PACIFIC POLICY Inter national Programs at RAND CHILDREN AND FAMILIES EDUCATION AND THE ARTS The RAND Corporation is a nonprofit institution that helps improve policy and

Add to Reading List

Source URL: www.rand.org

Language: English - Date: 2012-11-01 12:49:22
48Computer architecture / Computing / Unified Extensible Firmware Interface / Volume boot record / Boot sector / Master boot record / Windows Vista startup process / Malware / Real mode / Booting / BIOS / System software

Bootkit Threats: In Depth Reverse Engineering & Defense Eugene Rodionov Aleksandr Matrosov Outline of The Presentation

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2012-06-26 12:28:06
49Security / Network security / SCADA / Vulnerability / Password / DMZ / Hacker / Defense in depth / Control system security / Computer network security / Computer security / Cyberwarfare

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

Add to Reading List

Source URL: www.inl.gov

Language: English - Date: 2006-07-06 12:03:46
50Army National Guard / United States Army / United States Department of Defense / United States Army Reserve

An operational force providing strategic depth in an era of persistent conflict BG William “Jay” Gothard Deputy Commanding General (Support) / Chief of Staff, United States Army Reserve Command

Add to Reading List

Source URL: www.bracrtf.com

Language: English - Date: 2010-12-10 14:28:27
UPDATE