Information security

Results: 50180



#Item
171

For more information, visit: www.caci.com/Cyber_Security Cyber Security CACI drives breakthrough solutions by combining our years of cyber

Add to Reading List

Source URL: www.caci.com

- Date: 2018-02-20 15:20:14
    172

    ZEPHYR TOKEN SALE PRIVACY POLICY 1.0 OVERVIEW Your privacy is important to us. This privacy policy is intended to give you confidence in the privacy and security of the personal information we obtain from you whether you

    Add to Reading List

    Source URL: zephyr.bitspark.io

    - Date: 2017-09-21 14:24:09
      173

      Improving language-based predictive mitigation for information-flow security Jérémy Thibault1 and Aslan Askarov2 1 École Normale Supérieure de Rennes, France

      Add to Reading List

      Source URL: perso.eleves.ens-rennes.fr

      - Date: 2017-09-12 01:23:02
        174

        Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

        Add to Reading List

        Source URL: epic.org

        - Date: 2015-11-23 07:02:54
          175

          INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA SRI LANKA CERT|CC Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of

          Add to Reading List

          Source URL: www.slcert.gov.lk

          - Date: 2018-02-09 00:46:39
            176

            Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

            Add to Reading List

            Source URL: marc-stevens.nl

            - Date: 2017-08-13 07:48:58
              177

              The Gridiron Risk Model Aptible Gridiron uses a graph database to model information security risks, events or situations that have the potential to cause adverse impacts.

              Add to Reading List

              Source URL: www.aptible.com

              - Date: 2018-03-21 14:07:12
                178

                The Gridiron Compliance Model Aptible Gridiron helps software engineering teams easily stand up and maintain information security management programs that can meet stringent compliance and security requirements, such as

                Add to Reading List

                Source URL: www.aptible.com

                - Date: 2018-03-21 14:07:12
                  179

                  CSIRT description for CESNET-CERTS the CESNET, a.l.e. security team 1. Document Information

                  Add to Reading List

                  Source URL: csirt.cesnet.cz

                  - Date: 2018-03-01 09:50:57
                    UPDATE