Infrastructure security

Results: 6100



#Item
481Petroleum / Soft matter / Environmental economics / Futurology / Petroleum politics / Unconventional oil / Energy crisis / Energy security / Natural gas / Energy / Peak oil / Energy economics

CO2 sequestration infrastructure

Add to Reading List

Source URL: www.energy-pathways.org

Language: English - Date: 2011-02-03 07:07:31
482Resilience / Public safety / Management / Security / Construction / Development / Infrastructure

Leadership Team   Terri  Butler   Corey  Weathers   Anne  Acosta   Ka5a  Blackburn  

Add to Reading List

Source URL: seattle.gogreenconference.net

Language: English - Date: 2015-05-06 19:51:18
483Internet / Internet protocols / Network architecture / Internet standards / Cipher suite / Transport Layer Security / Telex / Proxy server / HTTP Secure / Cryptographic protocols / Secure communication / Computing

To appear in Proc. 20th Usenix Security Symposium (Usenix Security), AugustFor updates, source code, and an online demonstration, visit https://telex.cc. Telex: Anticensorship in the Network Infrastructure Eric Wu

Add to Reading List

Source URL: telex.cc

Language: English - Date: 2015-03-01 23:33:20
484Management / American Society of Civil Engineers / Construction / Infrastructure / United States Department of Homeland Security / Resilience / Psychological resilience / United States Army Corps of Engineers / Federal Emergency Management Agency / Emergency management / Public safety / National security

TISP FACT SHEETWHAT IS TISP The Infrastructure Security Partnership (TISP) is a national partnership of agencies, companies, associations and individuals sharing a common interest in increasing the capacity of

Add to Reading List

Source URL: www.same.org

Language: English - Date: 2015-05-13 12:15:24
485OSI protocols / Computer network security / Data security / Internet standards / Pcap / Firewall / Internet protocol suite / Communications protocol / OSI model / Computing / Software / Data

Modern Network Infrastructure Security Layer 2 Protocol Flaws Illustrated and Codified May 2004 Mike Schiffman, Cisco Systems Jeremy Rauch, Duncansoft Inc.

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2004-06-11 13:30:17
486Security / Computer network security / Software testing / Electronic commerce / Vulnerability / Hacking / Cyberwarfare / Computer security

Sensus Selects Achilles To Test FlexNet AMI Products July 12, 2010 As advanced metering and smart grid infrastructure suppliers rapidly roll-out new feature and functionality to meet the evolving needs of global utilitie

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:13
487Terrorism / Law enforcement / Public safety / Counter-terrorism / Europol / Joint Terrorism Analysis Centre / Critical infrastructure / Definitions of terrorism / European Union / National security / Security / Government

Security of the spectacle: The EU’s guidelines for security at major events

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-12-14 05:12:02
488Electronic warfare / Hacking / Military technology / SCADA / Telemetry / Stuxnet / Computer security / Critical infrastructure protection / Cyberwarfare in the United States / Technology / Cyberwarfare / Security

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 19:30:32
489Graphic design / Defense Intelligence Agency / Social networking service / International Multilateral Partnership Against Cyber Threats / National security / Technology / Structure / Department of Defense Cyber Crime Center / Critical infrastructure protection / Computer crimes / Brand / Communication design

Brand Intelligence Cyveillance Brand IntelligenceTM reports connect your team to the pulse of your business’ brands, products, and services by monitoring for inflammatory language, key fan opinions, and overall brand s

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 15:14:39
490United States federal executive departments / Military science / Critical infrastructure protection / U.S. Department of Defense Strategy for Operating in Cyberspace / United States Department of Defense / Insider / National security

GAO, INSIDER THREATS: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-06-02 15:11:33
UPDATE