Center for Internet Security

Results: 308



#Item
151This Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Information Sharing Initiatives was prepared by SEARCH, The National Consortium for Justice Information and Statistics; Francis X. Aumand

This Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Information Sharing Initiatives was prepared by SEARCH, The National Consortium for Justice Information and Statistics; Francis X. Aumand

Add to Reading List

Source URL: www.search.org

Language: English - Date: 2014-10-29 10:59:00
152Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Add to Reading List

Source URL: dhsem.state.co.us

Language: English - Date: 2014-10-30 18:40:33
153Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-10-29 08:22:23
154OVAL Board Meeting[removed]Attendees Scott Armstrong – INADEV Corporation Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Tigran Gevorgyan – Qualys, Inc.

OVAL Board Meeting[removed]Attendees Scott Armstrong – INADEV Corporation Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Tigran Gevorgyan – Qualys, Inc.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2014-11-07 14:47:26
155Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Add to Reading List

Source URL: www.secretservice.gov

Language: English - Date: 2014-10-30 16:08:55
156Center for Internet Security Configuration Assessment Tool CIS-CAT Users Guide v3.0.05

Center for Internet Security Configuration Assessment Tool CIS-CAT Users Guide v3.0.05

Add to Reading List

Source URL: benchmarks.cisecurity.org

Language: English - Date: 2014-09-17 15:15:53
157Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Law Enforcement Cyber Incident Reporting A Unified Message for State, Local, Tribal, and Territorial Law Enforcement

Add to Reading List

Source URL: www.dhsem.state.co.us

Language: English - Date: 2014-10-30 18:40:33
158Case 1:11-cv[removed]JDB Document 16 Filed[removed]Page 1 of 2  IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA __________________________________________ )

Case 1:11-cv[removed]JDB Document 16 Filed[removed]Page 1 of 2 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA __________________________________________ )

Add to Reading List

Source URL: epic.org

Language: English - Date: 2014-10-17 13:13:07
159Penetration Analysis of a XEROX Docucenter DC 230ST: Assessing the Security of a Multi-purpose Office Machine  Thomas E. Daniels, Benjamin A. Kuperman, Eugene H. Spafford CERIAS T.R. No[removed]Center for Education and R

Penetration Analysis of a XEROX Docucenter DC 230ST: Assessing the Security of a Multi-purpose Office Machine  Thomas E. Daniels, Benjamin A. Kuperman, Eugene H. Spafford CERIAS T.R. No[removed]Center for Education and R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
160August 2014 Volume 9, Issue 8 Secure Online Banking Center for Internet Security

August 2014 Volume 9, Issue 8 Secure Online Banking Center for Internet Security

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2014-09-08 12:08:10