Infrastructure security

Results: 6100



#Item
191Cybercrime / Computer security / Hacker groups / Internet-based activism / Cyberwarfare / International cybercrime / Anonymous / Cyber Intelligence Sharing and Protection Act / Sony Pictures Entertainment hack / LulzSec / Hacktivism / United States Department of Homeland Security

INVESTING IN A CENTRALIZED CYBERSECURITY INFRASTRUCTURE: WHY “HACKTIVISM” CAN AND SHOULD INFLUENCE CYBERSECURITY REFORM Brian B. Kelly INTRODUCTION ...................................................................

Add to Reading List

Source URL: www.bu.edu

Language: English - Date: 2016-01-14 14:26:29
192Computer network security / CBRN defense / Emergency management / Radioactive contamination / Computer security / Threat

0 11 November 2012 Nieuwenhuizen EU FP 7 SPIRIT project concerning CBRE infrastructure protection

Add to Reading List

Source URL: www.iccss.eu

Language: English - Date: 2015-06-19 09:14:35
193Transport Layer Security / Public-key cryptography / Key management / Public key infrastructure / Cryptographic protocols / Online Certificate Status Protocol / Revocation list / Certificate authority / X.509 / OCSP stapling / Revocation / Key

2016 IEEE European Symposium on Security and Privacy PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS Ecosystem Pawel Szalachowski, Laurent Chuat, and Adrian Perrig Department of Computer

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-04-19 10:06:03
194Standards organizations / WLAN Authentication and Privacy Infrastructure / IEEE 802.11 / IEEE Standards Association / Wireless security / ISO/IEC JTC 1 / International Organization for Standardization / IEEE 802 / Wi-Fi / ISO/IEC JTC 1/SC 37

January 2006 doc.: IEEE0154r1 IEEE P802.11 Wireless LANs Fast Track Executive Summary Letter Date:

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2006-03-21 21:41:34
195Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:38:35
196Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing security

Thought Leadership Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:05:28
197Nuclear technology / Nuclear proliferation / Nuclear weapons / Nuclear safety and security / Nuclear Knowledge Management / Nuclear power / International Atomic Energy Agency / Nuclear law / Outline of nuclear power

FELLOWSHIPS international.anl.gov/fellowships Supporting Nuclear Power Infrastructure Capacity Building in Member States Introducing and Expanding Nuclear Power

Add to Reading List

Source URL: international.anl.gov

Language: English - Date: 2016-07-08 19:00:37
198Cyberwarfare / Computer security / Cybercrime / National security / Stuxnet / SCADA / United States Computer Emergency Readiness Team / Carnegie Mellon CyLab / Cyber-attack

New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State

Add to Reading List

Source URL: energyplan.ny.gov

Language: English - Date: 2013-10-11 12:07:43
199Regional Internet registries / Routing protocols / Public-key cryptography / Resource Public Key Infrastructure / NLnet / Internet Standards / Border Gateway Protocol / Asia-Pacific Network Information Centre / AFRINIC / Internet / IPv6 / American Registry for Internet Numbers

Internet  Rou*ng  Security:   What’s  Next?   Benno  Overeinder   NLnet  Labs   http://www.nlnetlabs.nl/

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-01-18 09:16:13
200E-commerce / OpenTravel Alliance / SAP SE / Societates Europaeae / Oracle Corporation / Computer security / SAP implementation / SAP Auto-ID Infrastructure / Penta Security

COMPANY OVERVIEW Business Critical Application Security Transforming how organizations protect the applications that manage their business-critical processes and information.

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-04 10:51:42
UPDATE