Infrastructure security

Results: 6100



#Item
971Rogue software / Spyware / Microsoft / Computing / Computer security / Malware / Cyberwarfare / Computer network security

Design for the “Uninterested” End-User A.J. Brush My Research: From applications to infrastructure

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-11-21 23:33:31
972Computer security / Cyberwarfare / Infrastructure / Crime prevention / National Cyber Security Division / National Strategy to Secure Cyberspace / Critical infrastructure protection / Critical infrastructure / United States Computer Emergency Readiness Team / Security / National security / United States Department of Homeland Security

Microsoft Word - CAllentestimonyApril20HR285Final.doc

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:27
973Iris recognition / University of Cambridge Computer Laboratory / Surveillance / Identity management / Authentication / Iris / Password / Security / Access control / Biometrics

Proceedings of The 4th International Platform on Integrating Arab e-Infrastructure in a Global Environment e-AGE 2014

Add to Reading List

Source URL: asrenorg.net

Language: English - Date: 2015-01-15 05:34:56
974United States Department of Homeland Security / Public safety / Security engineering / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / Critical infrastructure protection / National Cyber Security Division / Cyber-security regulation / National security / Security / Computer crimes

(Letterhead with state The Financial Services Roundtable and BITS)

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:20
975Information Technology Infrastructure Library / Method engineering / Standards / Motorola / IDIQ / Mobile radio / IT service management / Government / SBInet / Information technology management / Technology / United States Department of Homeland Security

Streamlining the Business of Government. DHS–Wide Tactical Communications (TacCom) Contract Number: HSSS01-12-DThe DHS-wide Tactical Communications (TacCom) contract is a multiple

Add to Reading List

Source URL: www.affigent.com

Language: English - Date: 2013-08-06 11:04:24
976Public safety / United States Department of Homeland Security / Cyber-security regulation / Computer crimes / Computer security / National Cyber Security Division / Critical infrastructure protection / Security / National security / Cyberwarfare

(Letterhead with state The Financial Services Roundtable and BITS)

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:23
977Security / Security engineering / Critical infrastructure protection / Cyberwarfare / Critical infrastructure / Computer security / PDD-62 / National Cyber Security Division / National security / United States Department of Homeland Security / Infrastructure

WHITE PAPER The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
978Computer security / Computer network security / Crime prevention / Electronic commerce / National security / Trust / Institute for Information Infrastructure Protection / Data security / Information Trust Institute / Ethics / Security / Computer crimes

National Cyber Leap Year Summit 2009

Add to Reading List

Source URL: tahoe-lafs.org

Language: English - Date: 2014-12-16 18:34:05
979Cloud computing / Software / Hadoop / Apache Hadoop / Parallel computing / MapReduce / MapR / Kerberos / Cloudera / Computing / Concurrent computing / Cloud infrastructure

Hadoop Security Design? Just Add Kerberos? Really? Andrew Becherer Black Hat USAhttps://www.isecpartners.com

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:46
980Information Technology Infrastructure Library / Change management / IT service management / Business process improvement / Configuration management database / Quality management / ITIL security management / Application Services Library / Information technology management / Project management / Information technology

TURNING SERVICE MANAGEMENT THEORY INTO REALITY Michael Cardinal V2.0 December 9, 2004 OVERVIEW

Add to Reading List

Source URL: www.nspartners.com

Language: English - Date: 2011-05-27 17:03:55
UPDATE