Operations security

Results: 5095



#Item
201

Detecting Threats via Network Anomalies Gregory Pickett • Hellfire Security • Cybersecurity Operations

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:06
    202

    THE MONTREUX DOCUMENT On pertinent international legal obligations and good practices for States related to operations of private military and security companies during armed conflict

    Add to Reading List

    Source URL: psm.du.edu

    Language: English - Date: 2012-08-14 16:41:34
      203

      Mexic0 Uniform Impunity Mexico’s Misuse of Military Justice to Prosecute Abuses in Counternarcotics and Public Security Operations

      Add to Reading List

      Source URL: laddo.org

      Language: English - Date: 2015-01-08 14:55:28
        204

        Examining the Impact of Security Management on the Business Information security professionals, network operations and application owners provide insight on the increasingly complex interaction between business critical

        Add to Reading List

        Source URL: www.algosec.com

        Language: English - Date: 2014-07-07 06:07:38
          205

          Terms of Reference High-level Independent Panel on UN Peace Operations 1. In his 11 June speech to the Security Council, the Secretary-General noted several trends affecting UN peacekeeping operations and called for broa

          Add to Reading List

          Source URL: icvanetwork.org

          Language: English
            206

            Data Clarity® Platform Security Operations Incident response investigative intelligence enterprise application rapidly mitigates the costs and risks of breaches with a low total cost

            Add to Reading List

            Source URL: www.databridgemgt.com

            Language: English - Date: 2014-12-10 12:37:54
              207

              Securing Data and Handling Spillage Events What Is a Data Spill and Why Is It a Problem? Loss of control over sensitive and protected data by organizations is a serious threat to business operations and national security

              Add to Reading List

              Source URL: www.nsa.gov

              Language: English - Date: 2012-11-15 13:37:23
                208

                DNS Operations Advanced DNS Operations & Security Goals

                Add to Reading List

                Source URL: nsrc.org

                Language: English - Date: 2015-02-17 16:20:03
                  209

                  Air Operations CybAirVision® Security Solutions from sensors to Command and Control centres CybAIRVision®: Breaking new

                  Add to Reading List

                  Source URL: www.thalesraytheon.com

                  Language: English - Date: 2013-07-05 03:56:16
                    210

                    STATEMENT OF AMBASSADOR PATRICK KENNEDY UNDER SECRETARY FOR MANAGEMENT U.S. DEPARTMENT OF STATE Before the Subcommittee on National Security, Homeland Defense, and Foreign Operations House Committee on Oversight and Gove

                    Add to Reading List

                    Source URL: oversight.house.gov

                    Language: English - Date: 2012-06-27 18:49:09
                      UPDATE