Infrastructure security

Results: 6100



#Item
681Security engineering / United States Department of Homeland Security / Crime prevention / Critical infrastructure protection / Infrastructure / Computer security / Situation awareness / Risk / National security / Security / Public safety

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:31
682Cyberwarfare / National security / Internet protocols / Internet standards / Infrastructure security / Denial-of-service attack / Cloud computing / Computer security / Border Gateway Protocol / Internet / Computer network security / Computing

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:14
683Infrastructure / Institute for Information Infrastructure Protection / Critical infrastructure protection / Infrastructure security / Computer security / Cyberwarfare / Champaign–Urbana metropolitan area / Critical infrastructure / Marcus Sachs / National security / United States Department of Homeland Security / Security

Microsoft Word - ConferenceProgram2008.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2008-03-11 11:11:27
684Murray–Darling basin / Water security / Murray River / Warragamba Dam / Drought / Infrastructure / Water supply and sanitation in Australia / Water security in Australia / Geography of Australia / Physical geography / States and territories of Australia

The opportunity Chapter 6 Water PageWater STRATEGIC OBJECTIVES

Add to Reading List

Source URL: insw.com

Language: English - Date: 2014-11-30 22:37:24
685Data security / Public safety / Agencies of the European Union / European Network and Information Security Agency / Information security / Critical infrastructure protection / National security / Security / Computer security

Technical Guideline on Incident Reporting Technical guidance on the incident reporting in Article 13a Version 2.1, October 2014 www.enisa.europa.eu

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-27 08:06:17
686European Union / Spatial data infrastructure / Global Monitoring for Environment and Security / Europe / Directive / Geographic information systems / Infrastructure for Spatial Information in the European Community / European Union directives

Microsoft Word - New_Book-Final+CV.doc

Add to Reading List

Source URL: csdila.unimelb.edu.au

Language: English - Date: 2012-07-10 17:37:51
687Water / International Maritime Organization / Water transport / International Ship and Port Facility Security Code / Maritime security / Customs Trade Partnership against Terrorism / Management / Supply chain security / Supply chain management / Law of the sea / Transport

Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness Elena Sadovaya, Vinh V. Thai Division of Infrastructure Systems & Maritime Studies,

Add to Reading List

Source URL: www.icms.polyu.edu.hk

Language: English - Date: 2012-05-31 23:31:38
688Infrastructure as a Service / Payment Card Industry Data Security Standard / OpenEdge Advanced Business Language / Computing / Amazon Elastic Compute Cloud / Cloud infrastructure

Bluebird Support Phil Jones Your Support Team • Francine Dunn – our new(ish) support manager • Product Support Analysts

Add to Reading List

Source URL: support.barsnet.com

Language: English - Date: 2013-10-01 15:01:25
689Middleware / Data distribution service / Message-oriented middleware / Computer network security / Real-Time Innovations / SCADA / Service-oriented architecture / Access control / Communications protocol / Computing / Technology / Security

WHITEPAPER Four Keys to Securing Distributed Control Systems Executive Summary At the core of critical infrastructure and industrial applications, control systems drive today’s power grid,

Add to Reading List

Source URL: www.rti.com

Language: English - Date: 2015-04-10 15:34:04
690Cyberwarfare / Computer network security / Data security / Cyber security standards / Critical infrastructure protection / SCADA / RIPE / Vulnerability / North American Electric Reliability Corporation / Security / Computer security / National security

The RIPE Crosswalk Comparing the RIPE cyber security program to ICS security standards and frameworks Perry Pederson November 2014

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2014-11-06 03:38:57
UPDATE