Security Target

Results: 819



#Item
51Computer network security / Cyberwarfare / Data security / Firewall / Network management / Computer security / Security Target / Guard / Common Criteria

Microsoft WordSertit 012 Maintenance Report v_5.0

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2015-07-03 04:33:47
52Crime prevention / National security / Cyberwarfare / Computer network security / Malware / Computer security / Mobile security

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
53

TARGET CAPABILITIES LIST: Version 1.1 U.S. Department of Homeland Security OFFICE OF STATE AND LOCAL GOVERNMENT COORDINATION AND PREPAREDNESS

Add to Reading List

Source URL: www.ncrhomelandsecurity.org

Language: English - Date: 2005-12-14 14:49:09
    54Computing / Data management / Data / Sqrrl / Computer security / Big data / Apache Accumulo / Threat / Analytics / Data analysis

    DATASHEET SQRRL ENTERPRISE TARGET. HUNT. DISRUPT. An Advanced Threat Detection and Response Platform Organizations face a growing number of adversaries threatening their networks. And even if they diligently

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-03-07 12:46:49
    55Actuarial science / Financial risk / Probability / Risk / Security / Security Target / Public health / Economy / Finance / Protection Profile

    10th ICCC, Tromsø Taming the complexity of the CC

    Add to Reading List

    Source URL: www.yourcreativesolutions.nl

    Language: English - Date: 2009-09-16 12:46:24
    56Economy / Computing / Business / Business intelligence / Computer security / Sqrrl / Threat / Analytics / Behavioral analytics / Big data / User behavior analytics

    Target. Hunt. Disrupt. INTRODUCING: THREAT HUNTING PLATFORMS INCIDENT DETECTION/RESPONSE WEAKNESSES

    Add to Reading List

    Source URL: sqrrl.com

    Language: English - Date: 2016-02-05 12:57:35
    57

    SOFTWARE SECURITY AND RANDOMIZATION THROUGH PROGRAM PARTITIONING AND CIRCUIT VARIATION MOVING TARGET DEFENSE (MTD) ’ 14 3 NOV 2014 Todd Andel

    Add to Reading List

    Source URL: csis.gmu.edu

    Language: English - Date: 2014-11-24 11:40:35
      58Government / United States government secrecy / Politics / Classified information / For Official Use Only / Freedom of information legislation / Anti-fascism / Gentrification / Anarchism / United States Department of Homeland Security

      UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Self-identified Anarchist Extremists Target Urban “Gentrification” Sites with Arson 23 JulyU//FOUO) Prepared by the Office of Intelligence and Analysis (I&A), Hom

      Add to Reading List

      Source URL: info.publicintelligence.net

      Language: English - Date: 2014-01-16 23:23:27
      59

      DATASHEET SQRRL ENTERPRISE TARGET. HUNT. DISRUPT. Sqrrl is the security intelligence company that enables organizations to target, hunt, and disrupt advanced cyber threats.

      Add to Reading List

      Source URL: sqrrl.com

      Language: English - Date: 2015-09-11 17:30:36
        60

        Security and a Science of Agility First ACM Workshop on Moving Target Defense Scottsdale, Arizona – November 3, 2014 Patrick McDaniel Systems and Internet Infrastructure Security Laboratory

        Add to Reading List

        Source URL: csis.gmu.edu

        Language: English - Date: 2014-11-24 11:32:14
          UPDATE