Operations security

Results: 5095



#Item
171

Proceedings of the 14th Colloquium for Information Systems Security Education Baltimore Marriott Inner Harbor Baltimore, Maryland June 7 - 9, 2010 A Hands-on Approach to Information Operations Education and Training

Add to Reading List

Source URL: www.usafa.edu

Language: English - Date: 2012-11-20 17:08:30
    172

    News Release Singtel and FireEye launch first joint Advanced Security Operations Centre in APAC to help enterprises counter sophisticated cyber attacks 

    Add to Reading List

    Source URL: singtel.co.jp

    Language: English - Date: 2015-05-26 08:19:26
      173

      Robert Franklin, Co-founder and President of National Security Solutions Since co-founding MorganFranklin, Rob Franklin has served as Chief Operations Officer, Chief Information Officer, and most recently President of Pu

      Add to Reading List

      Source URL: www.fairfaxchamber.org

      Language: English
        174Private law / Insolvency / Security interest / Chapter 11 /  Title 11 /  United States Code / Default / Reaffirmation agreement / Chapter 7 /  Title 11 /  United States Code / Bankruptcy / Law / Business

        RuleCHAPTER 11 – GENERAL (a) Operations. The trustee or debtor-in-possession in a Chapter 11 case may operate the business of the debtor pursuant to 11 U.S.C. § 1108 and any order of the Court specifying

        Add to Reading List

        Source URL: www.flmb.uscourts.gov

        Language: English - Date: 2015-06-30 16:05:39
        175Mass surveillance / Signals intelligence / Government / Foreign Intelligence Surveillance Act / 110th United States Congress / United States Foreign Intelligence Surveillance Court / National Security Agency / National security / Privacy of telecommunications / Surveillance

        Document: (TS//SI//NF) FISA Amendments Act Certifications and Operations Update by H ^ ^ H H onForeign Intelligence Surveillance Act (FISA) Amendments Act (FAA782) operations (PRISM and Upstream) require

        Add to Reading List

        Source URL: www.burojansen.nl

        Language: English - Date: 2014-03-18 03:11:06
        176

        The safety and security institute of the commercial explosives industry sinceMarch 24, 2015 Docket Management System U.S. Department of Transportation Dockets Operations, M-30

        Add to Reading List

        Source URL: law.resource.org

        Language: English - Date: 2015-03-25 15:13:49
          177Identity / Identity management / Intelligence / Military terminology / Biometrics / Battlespace / Military intelligence / Defense Intelligence Agency / Secretaría de Inteligencia / National security / Security / Military science

          United States Army IDENTITY OPERATIONS FOR STRATEGIC

          Add to Reading List

          Source URL: www.tradoc.army.mil

          Language: English
          178Military operations other than war / United Nations peacekeeping / United Nations / Emergency management / Human security / United Nations International Research and Training Institute for the Advancement of Women / United Nations Security Council Resolution / Ethics / Peacekeeping / Peace

          RECOMMENDATIONS FROM THE WOMEN OF CENTRAL AND EASTERN EUROPE AND THE COMMONWEALTH OF INDEPENDENT STATES RELATING TO WOMEN AND ARMED CONFLICT We, the women of Central and Eastern Europe and the Commonwealth of Independent

          Add to Reading List

          Source URL: www.karat.org

          Language: English - Date: 2013-07-19 10:06:48
          179Intelligence / Military intelligence / Defense Intelligence Agency / Central Intelligence Agency / Open-source intelligence / Biometrics / Signals intelligence / United States Intelligence Community / Operations security / National security / Data collection / Espionage

          UNCLASSIFIED INTELLIGENCE Enabling the Future of Military Operations  and Intelligence

          Add to Reading List

          Source URL: biometrics.org

          Language: English - Date: 2010-10-15 18:15:34
          180Bron–Kerbosch algorithm / Yelp /  Inc. / Networks / Line graph / Clique problem / Graph theory / Clique / Graph operations

          Poster: Spotting Suspicious Reviews via (Quasi-)clique Extraction Paras Jain, Shang-Tse Chen, Mozhgan Azimpourkivi† , Duen Horng Chau, Bogdan Carbunar† Georgia Tech, † Florida International University {paras, schen

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2015-05-11 16:42:39
          UPDATE