Infrastructure security

Results: 6100



#Item
171Cryptography / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Certificate authority / IdenTrust / Root certificate / Public key certificate / Authentication

IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
172Security / Nuclear technology / Infrastructure / Environment / San Onofre Nuclear Generating Station / Southern California Edison / Dry cask storage / Cryptography / National security / Holtec International / Corrosion / Computer security

Microsoft PowerPointFinal Holtec CEP DIDpptx

Add to Reading List

Source URL: www.songscommunity.com

Language: English - Date: 2015-07-23 19:05:20
173Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / X.509 / Certificate authority / Online Certificate Status Protocol / Public key certificate / Lightweight Directory Access Protocol / Revocation list

DOEGrids CA Release Notes Revision: Introduction The New DOEGrids Certificate Authority is ready for deployment by the operations staff. This document discusses the new service and the changes

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-04-08 19:00:32
174Economy of India / India / Indian missions / Poverty in India / NREGS / National Rural Employment Guarantee Act / Pradhan Mantri Gramin Awaas Yojana / Bharat Nirman / Nirmal Bharat Abhiyan / Poverty alleviation programmes in India / Union budget of India

SOCIAL SECURITY MEASURES IN INDIA RURAL INFRASTRUCTURE AND DEVELOPMENT 1. Bharat Nirman This programme, launched infor building infrastructure and basic amenities in rural areas, has six components, namely, rura

Add to Reading List

Source URL: indianfisheries.icsf.net

Language: English - Date: 2012-04-16 01:25:14
175Cryptography / Formal methods / Theoretical computer science / Computing / Computer security / Logic in computer science / Public key infrastructure / Formal verification / Correctness / Proof-carrying code / Authentication / Code signing

Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-01-27 19:53:39
176Computing / Data management / Data security / Information technology / Cloud infrastructure / Big data / Technology forecasting / Transaction processing / Internet privacy / Data quality / Personally identifiable information / Cloud computing

Ethical Market Models in the Personal Data Ecosystem Kaliya “Identity Woman” Personal Data Ecosystem Consortium ABSTRACT

Add to Reading List

Source URL: deviw.evelurie.net

Language: English - Date: 2016-04-07 21:09:36
177Disaster preparedness / Humanitarian aid / Business continuity and disaster recovery / National security / Resilience / Security / Emergency management / Disaster / Natural hazard / Coastal hazards / Psychological resilience / Federal Emergency Management Agency

Coastal Resilience Center (CRC) A DHS Science and Technology Center of Excellence Mission: To enhance the nation’s ability to safeguard people, infrastructure, and economies from coastal natural hazards such as

Add to Reading List

Source URL: web-oup.s3-fips-us-gov-west-1.amazonaws.com

Language: English - Date: 2016-05-06 11:14:03
178Disaster preparedness / Humanitarian aid / Infrastructure / United States Department of Homeland Security / Security / National Institute of Disaster Management / Disaster risk reduction / United Nations University / Emergency management / Critical infrastructure protection / Deutsche Gesellschaft fr Internationale Zusammenarbeit / Vulnerability assessment

Critical Infrastructures and Disaster Risk Reduction 46.cdr

Add to Reading List

Source URL: nidm.gov.in

Language: English - Date: 2013-10-24 06:24:52
179Public-key cryptography / Public key infrastructure / Cryptography / Alice and Bob

toStaticHTML() for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both A talk by Dr.-Ing. Mario Heiderich, Cure53 || @0x6D6172696F

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-01 11:31:28
180United States Department of Homeland Security / DHS National Protection and Programs Directorate / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / United States Computer Emergency Readiness Team / Homeland security / National Cyber Security Division / Stephenson Disaster Management Institute

JulyVolume 2, Issue 2 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights cross-sector initiatives, and identifies training and exercise opportunities, new tools

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2015-11-10 09:34:37
UPDATE