TERENA

Results: 773



#Item
381

Jumper CSIRT Presentation for TF-CSIRT Meeting Monday, 19th January 2009 Han van Thoor, CTO Jumper Consulting Ltd [removed] http://www.jumper.ie

Add to Reading List

Source URL: www.terena.org

- Date: 2009-01-20 07:26:08
    382Application security / Information technology management / Computing / ISO/IEC 27000-series / Working groups / Computer file formats / International Organization for Standardization / ISO JTC 1/SC 27 / ISO/IEC JTC1

    26th TF-CSIRT meeting 2009 FIRST Symposium 19th January 2009, Riga ISO standards relevant to CSIRTs (update on ISO/IEC[removed]and TF-CSIRT

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2009-01-19 12:16:26
    383Data mining / Denial-of-service attack / Computer emergency response team / Anomaly / Computing / Information technology management / Cyberspace / Data security / Computer network security / Anomaly detection

    An Anomaly Tool Implementation in GEANT – Part Three of Three Wayne Routly, DANTE TF-CSIRT, Leon; Spain, 18 May[removed]connect • communicate • collaborate

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2009-05-20 11:47:38
    384Graphing calculators / Carnegie Mellon University / Computer emergency response team / Programmable calculators

    Short report on the 6th meeting of the Trusted Introducer Review Board Warsaw, 29 May 2003 Karel Vietsch TI Review Board secretary

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2003-06-02 07:54:45
    385Spamming / Carnegie Mellon University / Computer emergency response team / Cybercrime / Spam / Email spam / Computer worm / RedIRIS / Internet / Computing / Email

    Daily problems for abuse teams Short brief from: Workshop in Madrid 14th Jan 2004 The organizer of the workshop •

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2004-01-19 07:53:49
    386Computer security / Rootkits / Core dump / Computing / Cyberwarfare / Malware

    Detecting Rootkits in Memory Dumps Pär Österberg Medina – SITIC[removed]

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2009-05-20 11:45:24
    387

    PDF Document

    Add to Reading List

    Source URL: www.terena.org

    - Date: 2003-03-13 10:29:46
      388National research and education network / Netflow / Computer emergency response team / Network architecture / Internet / Grid computing / Cyberinfrastructure / European Grid Infrastructure / Computing

      Grid Security Developments

      Add to Reading List

      Source URL: www.terena.org

      Language: English - Date: 2010-01-28 07:51:40
      389European Network and Information Security Agency / Vulnerability / Computer security / Hacking / Cyberwarfare

      Results from ENISA 2007 survey on providers’ security and anti-spam measures

      Add to Reading List

      Source URL: www.terena.org

      Language: English - Date: 2008-06-02 10:17:13
      390Computer emergency response team / Computer network security / Request Tracker / Shadowserver / Software / Abusehelper / Communication software

      Update on AbuseHelper Christian Van Heurck – CERT.be Presentation for Belnet Agenda

      Add to Reading List

      Source URL: www.terena.org

      Language: English - Date: 2011-09-22 11:30:30
      UPDATE