Infrastructure security

Results: 6100



#Item
511

Nexus Dialogue on Water Infrastructure Solutions: Building Partnerships for Innovation in Water, Energy and Food Security Glen Daigger

Add to Reading List

Source URL: www.waternexussolutions.org

Language: English - Date: 2014-04-03 09:08:14
    512

    APRIL 2013 Issue 3 IT ASSET DISPOSAL • RISK MANAGEMENT • COMPLIANCE • IT SECURITY • DATA PROTECTION Feature: unlock the value in your It Infrastructure

    Add to Reading List

    Source URL: www.adisa.org.uk

    Language: English - Date: 2013-08-11 09:13:51
      513

      Network Security: Overview Sandvine’s Network Security product reduces operating costs by protecting your reputation, your subscribers, and your infrastructure from a wide range of online threats and by letting you rap

      Add to Reading List

      Source URL: www.sandvine.com

      Language: English
        514

        Network Security CS261 – Which issues really are network security? Just as roads are seen infrastructure connecting resources, the network should be seen as an infrastructure connecting resources. Attacks can g

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:42
          515

          S TING: Finding Name Resolution Vulnerabilities in Programs Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2012-05-15 22:37:44
            516Web hosting / Cloud infrastructure / Rackspace / Computer security / Application firewall / Cloud storage / Rackspace Cloud / Cloud communications / Cloud computing / Centralized computing / Computing

            How to Bring Shadow IT into the Light 8 Steps Along the Path Contents

            Add to Reading List

            Source URL: c1776742.cdn.cloudfiles.rackspacecloud.com

            Language: English - Date: 2014-09-30 09:13:10
            517Security token / Certificate authority / Public key certificate / Smart card / Universal Serial Bus / Digital signature / Digital ID / Two-factor authentication / Public key infrastructure / Cryptography / Public-key cryptography / Key management

            Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

            Add to Reading List

            Source URL: www.cca.gov.np

            Language: English - Date: 2014-06-01 07:03:56
            518Security / Critical infrastructure protection / Security engineering / North American Electric Reliability Corporation / Federal Energy Regulatory Commission / Reliability engineering / Critical infrastructure / PlayStation Portable / National security / United States Department of Homeland Security / Infrastructure

            FAC TRMR-46 Reclamation Manual Directives and Standards TEMPORARY RELEASE (Expires)

            Add to Reading List

            Source URL: www.usbr.gov

            Language: English - Date: 2015-05-21 12:53:15
            519Romanian Space Agency / Sentinel / Global Earth Observation System of Systems / GeoEye / Spot Image / Infrastructure for Spatial Information in the European Community / Geospatial intelligence / SAGA-EO Project / BOSS4GMES / European Space Agency / Spaceflight / Global Monitoring for Environment and Security

            Actions and programs towards developing the national GMES capacity in Romania

            Add to Reading List

            Source URL: gmes-bg.org

            Language: English - Date: 2010-10-19 09:18:05
            520Computer crimes / Computer network security / Computer security / Secure communication / Critical infrastructure protection / Cyberwarfare / European Network and Information Security Agency / National Cyber Security Division / International Cybercrime / National security / Security / United States Department of Homeland Security

            COUNTRY: GREECE Greece does not have a cybersecurity strategy or dedicated cybersecurity legislation. The legal and institutional framework that supports cybersecurity is also limited. The national computer emergency res

            Add to Reading List

            Source URL: cybersecurity.bsa.org

            Language: English - Date: 2015-02-26 18:08:30
            UPDATE