Infrastructure security

Results: 6100



#Item
691Transport / Supply chain management / Security / Water transport / International Maritime Organization / International Ship and Port Facility Security Code / Port security / Risk management / Supply chain / Business / Technology / Management

The Role of Ports in Supply Chain Disruption Management Hui Shan Loh1*, Vinh V Thai2 1 Division of Infrastructure Systems and Maritime Studies, School of Civil and Environmental Engineering, Nanyang Technological Univers

Add to Reading List

Source URL: www.icms.polyu.edu.hk

Language: English - Date: 2012-05-27 05:12:05
692CPU cache / Computer data storage / Dynamic random-access memory / Direct memory access / Memory hierarchy / Solid-state drive / Cache / Random-access memory / Microarchitecture / Computer hardware / Computer memory / Computing

Defending Against Attacks on Main Memory Persistence∗ William Enck, Kevin Butler, Thomas Richardson, Patrick McDaniel, and Adam Smith Systems and Internet Infrastructure Security (SIIS) Laboratory, Department of Comput

Add to Reading List

Source URL: www.enck.org

Language: English
693Construction / Development / Microeconomics / Asset management / National security / Public capital / Critical infrastructure / Public infrastructure / South East Queensland Infrastructure Plan and Program / Infrastructure / United States Department of Homeland Security / Management

OVERVIEW Overview The Strategic Infrastructure Plan for South Australia (the plan) is about meeting South Australia’s future needs. Infrastructure is everywhere in the daily lives of South

Add to Reading List

Source URL: infrastructure.sa.gov.au

Language: English - Date: 2008-03-16 20:21:35
694Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
695United States Department of Homeland Security / Surveillance / Information Sharing Environment / Fusion center / Internet privacy / Critical infrastructure protection / Counter-terrorism / Emergency management / United States Intelligence Community / National security / Security / Government

National Strategy for Information Sharing

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:11:00
696Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-05-20 03:08:06
697Computing / Technology / Computer network security / Crime prevention / National security / Intel / Security controls / SCADA / Information security / Computer security / Security / Data security

Insights Factory of the Future Intel shares its insights into protecting critical infrastructure and industrial control systems.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 21:34:58
698Crime prevention / National security / Computer security / Human communication / Usability / Information security / Password / Multilevel security / Public key infrastructure / Security / Human–computer interaction / Cyberwarfare

Humans in the loop: Human-computer interaction and security - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:14
699Cyberwarfare / AlgoSec / McAfee / Network security / Firewall / Payment Card Industry Data Security Standard / Infrastructure optimization / Application firewall / Comparison of firewalls / Computer network security / Computer security / Computing

Solution Brief Simplify Management of Complex Firewall Policies Automate analysis, optimization, and risk assessment of policies within McAfee® Firewall Enterprise

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:05
700National security / Concurrent computing / Computer security / Computer network security / Data security / Information security / Cloud computing / Data center / Password / Computing / Security / Crime prevention

Safeguarding Your Data Multiple Tiers of Protection LeanKit’s holistic security infrastructure and advanced security measures provide protection against physical, network, server, application, and data vulnerabilities.

Add to Reading List

Source URL: leankit.com

Language: English - Date: 2015-05-28 17:08:06
UPDATE