National Strategy for Trusted Identities in Cyberspace

Results: 217



#Item
161Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace / Government / Public economics / Funding Opportunity Announcement / Security / Federal grants in the United States / National Institute of Standards and Technology / Federal assistance in the United States / Public finance / Grants

NSTIC FFO Pilots Cooperative Agreement Program

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-01-30 14:27:31
162Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:01:49
163Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / Howard Schmidt / Government / Cyberwarfare / Library of Congress

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-19 21:02:37
164Security / Public safety / Computer crimes / Comprehensive National Cybersecurity Initiative / Howard Schmidt / United States Department of Homeland Security / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer security / Computer network security

. Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions Eric A. Fischer Senior Specialist in Science and Technology

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2012-07-31 18:55:32
165Political communication / National Strategy for Trusted Identities in Cyberspace / Ecosystem management / Politics / Structure / Social psychology / Committees / Human communication / Meetings

Discussion Draft - Identity Ecosystem Sterring Group By-Laws

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-06-26 14:28:36
166Computer network security / Computer security / Security / National Strategy for Trusted Identities in Cyberspace / Cyber-security regulation / Congressional Research Service / United States Department of Homeland Security / National Cybersecurity Center / International Cybercrime / Government / Library of Congress / Cyberwarfare

Cybersecurity: Authoritative Reports and Resources, by Topic

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-06-09 20:43:15
167Public economics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Funding Opportunity Announcement / Economic policy / Federal grants in the United States / Grant / National Institute of Standards and Technology / Electronic submission / Grants / Federal assistance in the United States / Public finance

NSTIC Steering Group Secretariat Cooperative Agreement

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-09 14:07:44
168Identity management / Law / Internet privacy / National Strategy for Trusted Identities in Cyberspace / Information privacy / Political privacy / Ethics / Privacy / Human rights

The Identity Ecosystem Steering Group Privacy Coordination Standing Committee

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-07-27 10:30:53
169Political science / Social philosophy / Politics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Governance

July 12 Webinar Slide Deck

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-07-12 16:13:18
170Identity / Computer network security / National Strategy for Trusted Identities in Cyberspace / Public economics / Government / Funding Opportunity Announcement / Federal grants in the United States / Security / Identity management / Federal assistance in the United States / Public finance / Grants

Announcement of Federal Funding Opportunity (FFO) National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots: Trusted Online Credentials for Accessing Government Services Cooperative Agreement Program

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-04-16 12:51:04
UPDATE