Infrastructure security

Results: 6100



#Item
831Electronic warfare / Computer crimes / Security / Hacking / Cyberterrorism / Military technology / Electromagnetic pulse / Critical infrastructure protection / Computer security / Cybercrime / Cyberwarfare / National security

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 06:31:43
832Civil law / Authentication / Infrastructure / Security / European Strategy Forum on Research Infrastructures / Identity management

Manifesto The New Global Data Generation Simplifying and Guaranteeing Access and Sharing

Add to Reading List

Source URL: dasish.eu

Language: English - Date: 2015-05-16 05:36:36
833Public-key cryptography / Mobile technology / Public key infrastructure / Mobile commerce / Smart card / Cryptography / Electronic commerce / Key management

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:57
834Public key infrastructure / Public key certificate / Certificate authority / Certificate policy / X.509 / Cryptography / Public-key cryptography / Key management

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:45
835Information Technology Infrastructure Library / Incident management / Service desk / IT service management / Configuration management database / Problem management / Computer security incident management / Information technology management / Project management / Information technology

Incident Management What is it? Why use it? Who wants it? Cheryl Nickel

Add to Reading List

Source URL: www.itsmf.ca

Language: English - Date: 2011-10-07 13:19:58
836Management / Government procurement / Public–private partnership / Generally Accepted Accounting Principles / Infrastructure / Asset management / Asset-backed security / Melbourne / Australian Local Government Association / Government / Business / Economics

Microsoft Word - Dollery, Byrnes & Crase final.doc

Add to Reading List

Source URL: www.anzrsai.org

Language: English - Date: 2014-04-15 21:41:39
837Energy development / Energy economics / Law enforcement in the United States / Critical infrastructure protection / Nuclear terrorism / Energy security / United States Department of Homeland Security / Cyberwarfare / Port security / National security / Security / Public safety

WORKING DOCUMENT PROTECTING AMERICA’S CRITICAL ENERGY

Add to Reading List

Source URL: www.terrorism.com

Language: English - Date: 2012-02-04 12:13:41
838Information technology management / Open government / Public administration / Data security / Risk / EGovernment in Europe / Infrastructure optimization / Auditing / Internal control / Technology

PDF Document

Add to Reading List

Source URL: intranet.secure.griffith.edu.au

Language: English
839United States Department of Homeland Security / Public safety / Critical infrastructure protection / Security engineering / Critical infrastructure / Resilience / European Union / Trans-European Transport Networks / Emergency management / National security / Transport in Europe / Infrastructure

Microsoft Word - Rothenpieler

Add to Reading List

Source URL: www.ectri.org

Language: English - Date: 2014-05-07 09:20:30
840Computer network security / Honeypot / Q / MySQL / Argos / Software / System software / QEMU

How to set up the NoAH infrastructure? 2 Contents 1 Introduction

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-05-15 18:38:00
UPDATE