Infrastructure security

Results: 6100



#Item
821

We believe that we are on the verge of the Internet of Things explosion. Now is the time to make sure that IoT incorporates everything we’ve learned about digital security and infrastructure resiliency over the last 20

Add to Reading List

Source URL: www.eclipsecon.org

- Date: 2015-04-13 10:55:05
    822Computer security / Actuarial science / Risk management / Cyber-security regulation / Information security / Risk / Critical infrastructure / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Security / Public safety / National security

    On behalf of the Information Technology Sector Coordinating Council (IT SCC), we appreciate the opportunity to provide input to the National Institute of Standards and Technology (NIST) to its Request for Information (RF

    Add to Reading List

    Source URL: www.it-scc.org

    Language: English - Date: 2015-03-03 10:54:49
    823Global Monitoring for Environment and Security / GMES / Geographic information systems / Sentinel / Infrastructure for Spatial Information in the European Community / European Union / GMOSAIC / BOSS4GMES / European Space Agency / Spaceflight / Space policy of the European Union

    When the challenges raised by global climate change are daunting, when huge amounts of money can be saved with a better management of risks and crisis and when a sound management of natural resources is crucial for growt

    Add to Reading List

    Source URL: eurospace.win2.nucleus.be

    Language: English - Date: 2012-01-25 05:04:25
    824Public safety / Security / Security engineering / National Infrastructure Protection Plan / Cyberwarfare / Critical infrastructure protection / National Cyber Security Division / Information security / Emergency management / United States Department of Homeland Security / National security / Infrastructure

    Information Technology Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan May 2007

    Add to Reading List

    Source URL: www.it-scc.org

    Language: English - Date: 2015-02-20 13:29:37
    825Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

    Capability Myths Demolished Mark S. Miller Combex, Inc.

    Add to Reading List

    Source URL: www.erights.org

    Language: English - Date: 2005-10-31 18:00:51
    826Cloud storage / Cloud infrastructure / Data center / Cloud computing security / Cloud computing / Computing / Centralized computing

    The Cloud is Only as Secure as its Provider: What to Know Before You Migrate By Lauren Gibbons Paul One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing

    Add to Reading List

    Source URL: www.qtsdatacenters.com

    Language: English - Date: 2014-12-05 16:50:18
    827Meteorology / Actuarial science / Infrastructure / United States Department of Homeland Security / Adaptation to global warming / Global warming / Emergency management / Flood / Social vulnerability / Risk / Management / Atmospheric sciences

    May 12 16::00 Meeting Room 18 The role of critical infrastructures in disaster risk mitigation Session organisers: Elco Koks (Institute for Environmental Studies, IVM, Amsterdam) and Lorenzo

    Add to Reading List

    Source URL: www.ecca2015.eu

    Language: English - Date: 2015-04-23 06:04:15
    828United States Department of Energy National Laboratories / Security / Government / Livermore /  California / Sandia National Laboratories / Critical infrastructure protection / Los Alamos National Laboratory / Critical infrastructure / Infrastructure security / Infrastructure / United States Department of Homeland Security / National security

    20th International Congress on Modelling and Simulation, Adelaide, Australia, 1–6 December 2013 www.mssanz.org.au/modsim2013 Modeling and Simulation for Homeland Security K.L. Stambera, T.J. Browna, D.J. Pless a, and A

    Add to Reading List

    Source URL: www.mssanz.org.au

    Language: English - Date: 2013-11-19 22:05:26
    829International relations / Public safety / Counter-terrorism / Definitions of terrorism / War on Terror / State terrorism / National security / Terrorism / Security

    Terrorism and simulation of terrorist incidents across critical infrastructure

    Add to Reading List

    Source URL: www.mssanz.org.au

    Language: English - Date: 2013-01-16 02:05:23
    830Cloud infrastructure / Software distribution / Computer security / Software as a service / Integrated Cloud Service Management / IBM cloud computing / Cloud computing / Centralized computing / Computing

    Kaseya White Paper Eight Keys to Cloud Friendly Systems Management www.kaseya.com

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    UPDATE