Security convergence

Results: 112



#Item
21National security / Information Systems Security Association / Information security / Nonprofit organization / Security convergence / Data security / Security / Public safety

FOR IMMEDIATE RELEASE Jim GoyjerEmail: Nonprofits Get Free Entry to the ISSA-LA 7th Annual Information Security Summit on Cybercrime Solutions - June 4 – 5 ISSA-LA Offers No

Add to Reading List

Source URL: www.issala.org

Language: English - Date: 2015-03-26 15:20:10
22Data security / Management / Computer security / Information security / Security convergence / Risk / Security / Actuarial science / Public safety

About the Author For more information and to try out some of the more interesting analytical tools created by Dr. Cohen, call him up, visit his Web site at http://all.net/, or contact him via email.

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-06-16 02:07:19
23Routing protocols / Public-key cryptography / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Digital signature / Convergence / RSA / Internet / Network architecture / Computing

Simulation Modelling Practice and Theory–216 www.elsevier.com/locate/simpat Evaluation of efficient security for BGP route announcements using parallel simulation David M. Nicol

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:44:25
24Security / Risk / Management / Certified Information Systems Auditor / CISA / Prevention / Information technology security audit / Security convergence / Professional certification / Auditing / Data security / Information technology audit

Microsoft Word - CISASCMagazine.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:04
25Risk / Information technology audit / Security / Computer security / Information Systems Audit and Control Association / CISA / Professional certification / Corporate governance of information technology / Security convergence / Auditing / Risk analysis / Data security

Microsoft Word - CISAScore.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:04
26Auditing / Information technology audit / Risk analysis / Ethics / Information Systems Audit and Control Association / Certified Information Systems Auditor / Risk management / Security convergence / IT risk management / Risk / Security / Data security

Microsoft Word - CRISC2011-01.doc

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2012-11-28 20:01:04
27Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Computer networking / Path vector protocol / Router / Convergence / Network architecture / Internet / Computing

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
28International humanitarian law / United Nations Interim Administration Mission in Kosovo / Military use of children / United Nations / Kosovo / Peace / International law / Laws of war / Kosovo War / United Nations Security Council Resolution

Third Winter School on the Convergence and Conflicts of Human Rights (IHRL) and International Humanitarian Law (IHL) in Military Operations The winter school is a joint-venture between the Institute for International and

Add to Reading List

Source URL: www.icla.up.ac.za

Language: English - Date: 2014-04-10 08:45:57
29Computer network security / Auditing / Information Systems Audit and Control Association / Public safety / Security convergence / Security / Computer security / Information technology audit

Study: 82% of Organizations Expect a Cyberattack, Yet 35% Are Unable to Fill Open Security Jobs Global Talent Pool Reflects Urgent Skills Shortage and Hiring Delays Rolling Meadows, IL, USA (14 AprilAccording to

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-14 16:33:44
30Routing protocols / Internet protocols / Internet standards / Border Gateway Protocol / Routing / Computer networking / Path vector protocol / Router / Convergence / Network architecture / Internet / Computing

IMPACT OF BGP SECURITY DEPLOYMENT ON ROUTE VALIDATION ALEX ȘTEFĂNESCU 2 MarBGP SECURITY ISSUES

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-03 09:07:54
UPDATE