and Security Technologies

Results: 1110



#Item
911United States Department of Homeland Security / Public safety / Electronic warfare / Hacking / Military technology / Critical infrastructure protection / Computer security / Internet Security Alliance / International Multilateral Partnership Against Cyber Threats / National security / Cyberwarfare / Security

Testimony of Larry Clinton, President & CEO Internet Security Alliance before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies Homeland Security Committee

Add to Reading List

Source URL: www.isalliance.org

Language: English - Date: 2012-11-15 16:01:23
912Computer network security / Companies listed on the New York Stock Exchange / NetScreen Technologies / Internet protocols / Internet standards / Secure Shell / FIPS 140 / Telnet / Virtual private network / Computing / Internet / Juniper Networks

FIPS[removed]SECURITY POLICY Juniper Networks NetScreen-5XT HW P/N NS-5XT VERSION 1010 FW VERSIONS SCREENOS 5.0.0R9.H, SCREENOS 5.0.0R9A.H AND SCREENOS 5.0.0R9B.H Juniper NS-5XT Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
913Network architecture / Denial-of-service attack / Load balancing / Proxy server / Internet Relay Chat flood / Internet security / Prolexic Technologies / SYN flood / Transport Layer Security / Computing / Denial-of-service attacks / Internet

TLP: WHITE National Cybersecurity and Communications Integration Center 29 January[removed]DDoS Quick Guide

Add to Reading List

Source URL: www.ofi.louisiana.gov

Language: English - Date: 2014-02-07 10:31:08
914Energy / Smart grid / Technology / Electric power distribution / Electrical grid / Grid computing / IEEE Smart Grid / Smart grid policy in the United States / Electric power transmission systems / Electric power / Emerging technologies

Under the Energy Independence and Security Act of[removed]Public Law[removed], often referred to as “EISA”), NIST has been given “primary responsibility to coordinate development of a framework that includes protocols

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-21 15:29:00
915Office equipment / Simple Network Management Protocol / Technology / Computing / Information technology management / Multifunction printer

SECURITY SUITE SHARP—A LEADER IN MFP & PRINTER SECURITY SYSTEMS Our information and instant-communication world is filled with a vast array of technologies where all types of devices create, share, store, and transmi

Add to Reading List

Source URL: files.sharpusa.com

Language: English - Date: 2014-06-18 13:16:09
916Intel / Health Insurance Portability and Accountability Act / Computing / Technology / Information technology management / Intel AMT versions / Trusted Execution Technology / Out-of-band management / Intel vPro / Intel Active Management Technology

Client Technologies that Help Assist with Security and Privacy Regulation Compliance David Houlding, Intel Corporation Edward J. Herold, Intel Corporation

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
917Energy / Electrical grid / Standards organizations / Smart grid / Electric power distribution / Federal Energy Regulatory Commission / Computer security / National Institute of Standards and Technology / Smart grid policy in the United States / Electric power / Electric power transmission systems / Emerging technologies

GAO[removed]Highlights, ELECTRICITY GRID MODERNIZATION: Progress Being Made on Cybersecurity Guidelines, but Key Challenges Remain to be Addressed

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 08:41:31
918Privacy / Law / Data privacy / Family Educational Rights and Privacy Act / Internet privacy / Information privacy law / United States Department of Education / Legal aspects of computing / LeRoy Rooker / Privacy law / Ethics / Computer law

United States House of Representatives 113th Congress, 2nd Session Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection and Security Technologies and

Add to Reading List

Source URL: democrats.edworkforce.house.gov

Language: English - Date: 2014-06-25 11:19:20
919FIPS 140 / Smart card / Zeroisation / Public-key cryptography / Cryptography / Cryptography standards / FIPS 140-2

Baltimore ACCE SP Security Policy 1447 SD0122 4.0 Copyright © 2000 Baltimore Technologies Ltd. This document may be reproduced and distributed providing such a reproduction is complete and unmodified.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
920Computer security / Companies listed on the New York Stock Exchange / NetScreen Technologies / Virtual private network / FIPS 140 / RADIUS / Secure Shell / Internet security / Computer network security / Computing / Juniper Networks

FIPS[removed]SECURITY POLICY Juniper Networks NetScreen-5200 HW P/N NS-5200 VERSION 3010 FW VERSIONS SCREENOS 5.0.0R9.H, SCREENOS 5.0.0R9A.H AND SCREENOS 5.0.0R9B.H Juniper NS-5200 Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE