<--- Back to Details
First PageDocument Content
Data security / Cyberwarfare / Computer network security / Telecommunications Industry Association / International Multilateral Partnership Against Cyber Threats / Security controls / Cyber-security regulation / United States Computer Emergency Readiness Team / Federal Information Security Management Act / Security / Computer security / National security
Date: 2013-07-30 09:52:17
Data security
Cyberwarfare
Computer network security
Telecommunications Industry Association
International Multilateral Partnership Against Cyber Threats
Security controls
Cyber-security regulation
United States Computer Emergency Readiness Team
Federal Information Security Management Act
Security
Computer security
National security

July 29, 2013 Via Electronic Filing ([removed]) Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Add to Reading List

Source URL: www.tiaonline.org

Download Document from Source Website

File Size: 218,28 KB

Share Document on Facebook

Similar Documents

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang  Department of Computer Science

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

DocID: 1xW0O - View Document

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

DocID: 1xUoJ - View Document

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

DocID: 1xUke - View Document

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

Poster: Multi-source data analysis for SQL injection detection Kevin Ross, Melody Moh, Teng-Sheng Moh Jason Yao

DocID: 1xU6W - View Document

CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap (

CoinCap.io, CoinCap Apps Online Privacy Notice Data protection and security are important to CoinCap ("CoinCap"; "we"), as is your trust in our company and services. CoinCap is committed to processing your personal data

DocID: 1xTMb - View Document