Infrastructure security

Results: 6100



#Item
621Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / Under Secretary of Defense for Acquisition /  Technology and Logistics / Office of the Secretary of Defense / Assistant Secretary of Defense for Public Affairs / United States Department of Defense / Defense Intelligence Agency / United States federal executive departments / National security / Government

Advance Questions for John P. Stenbit Nominee for the Position of Assistant Secretary of Defense (Command, Control, Communications and Intelligence) 1. Defense Reforms More than a decade has passed since the enactment of

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
622Energy development / Energy in Australia / Energy policy / Low-carbon economy / Sustainable energy / National Electricity Market / Energy industry / Renewable energy / Energy security / Energy economics / Energy / Technology

E N EENRE RGGYY Link to South Australia’s Strategic Plan Objectives Provision of a reliable and affordable supply of energy through timely investment in new electricity generation capacity, alternative energy sources

Add to Reading List

Source URL: infrastructure.sa.gov.au

Language: English - Date: 2008-03-16 20:21:35
623Water supply / Water security / Email / International security / Science / Technology / Construction / Development / Infrastructure

Agricultural Competitiveness White Paper Submission - IP399 Plains Water Ltd Submitted 17 April 2014 Response to the Call for Submissions Agricultural Competitiveness White Paper

Add to Reading List

Source URL: agriculturalcompetitiveness.dpmc.gov.au

Language: English - Date: 2014-04-24 01:26:05
624Agricultural productivity / Rice / Food security / Food and drink / Agriculture in Iran / Agriculture in Vietnam / Agriculture / Sustainable agriculture / Environment

CHAPTER 2 Investing in Agriculture and Rural Infrastructure for Robust Economic Growth and Accelerated Poverty Reduction in Cambodia: Challenges, Prospects, and Issues for Regional Cooperation

Add to Reading List

Source URL: www.eria.org

Language: English - Date: 2013-05-12 05:06:00
625Software testing / Risk / Hacking / Technology / Vulnerability / CVSS / Social vulnerability / SCADA / Penetration test / Computer security / Cyberwarfare / Computer network security

QSec: Supporting Security Decisions on an IT Infrastructure F.Baiardi, F. Corò, F. Tonelli, Dip. di Informatica, Univ. di Pisa L Guidi

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 09:55:13
626Computer security / Security / Public key infrastructure / Trusted Computing / Public key certificate / Security token / Public-key cryptography / Key management / Cyberwarfare

SHEMP: Secure Hardware Enhanced MyProxy A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 17:25:52
627Network architecture / Computer network security / Address Resolution Protocol / ARP spoofing / Dynamic Host Configuration Protocol / DNS spoofing / DSniff / IP address / Man-in-the-middle attack / Internet standards / Internet / Computing

TARP: Ticket-based Address Resolution Protocol Wesam Lootah, William Enck, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania Stat

Add to Reading List

Source URL: www.enck.org

Language: English
628Computer network security / Data management / Crime prevention / National security / Infrastructure optimization / Network performance / Quest Software / Provisioning / Computer security / Computing / Concurrent computing / Distributed computing

DATASHEET Protect Against Internal and External Threats Cybercrime is everywhere, and government agencies are attractive targets for anyone who wants to create havoc for reasons like financial gain, political motivation

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:33
629Philosophy of religion / Security / Spirituality / Omniscience / Infrastructure / Omnipotence / InfraGard / Self / Social psychology / Religion

Requirements for a Secure Information Infrastructure Matt Curtin September 18, 2002 Dayton InfraGard

Add to Reading List

Source URL: web.interhack.com

Language: English - Date: 2009-04-12 15:00:24
630System administration / Data security / Splunk / Cloud infrastructure / Amazon.com / Software as a service / Chef / Amazon Elastic Compute Cloud / Continuous integration / Cloud computing / Computing / Centralized computing

CASE STUDY : Opscode + Splunk CLOUD RULE #536: There’s no such thing as being ‘too agile.’

Add to Reading List

Source URL: www.chef.io

Language: English - Date: 2015-05-29 14:56:43
UPDATE