Computer security conference

Results: 514



#Item
81Crime prevention / National security / Computing / Public safety / Data security / Penetration test / Information security / Cloud computing security / Cloud computing / Security / Computer security / Computer network security

TECHNICAL LEVEL DESIGNATIONS CONFERENCE AT-A-GLANCE Wednesday, March 25

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2015-02-06 12:03:44
82Ethics / Cryptography / Cryptographic software / Software / File sharing networks / Tor / Anonymity / Computer security conference / Peer-to-peer / Internet privacy / Identity management / Social issues

Rob G. Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems 4555 Overlook Avenue SW Washington, DC 20375

Add to Reading List

Source URL: www.robgjansen.com

Language: English - Date: 2015-06-06 16:07:00
83Federated identity / Single sign-on / Password / Identity management / Computer security / Security / Access control

Single Sign-On Release Information FAMIS Post-Conference Workshop June 26, 2013

Add to Reading List

Source URL: www.famisonline.org

Language: English - Date: 2013-06-26 15:58:09
84Public safety / War / Electronic warfare / Hacking / Military technology / United States Department of Homeland Security / Computer security / International Multilateral Partnership Against Cyber Threats / Cyber-security regulation / Security / Cyberwarfare / Computer crimes

2013 Annual ACSC Conference Cyber Security Threat Sharing: A Roadmap for Collaborative Defense Charlie Benway

Add to Reading List

Source URL: www.acscenter.org

Language: English - Date: 2013-12-05 12:45:22
85Indian voting machines / Science and technology in India / Elections / Election fraud / Electronic voting / Voting machine / Ballot / Electoral fraud / Secret ballot / Politics / Elections in India / Election technology

To appear in Proc. 17th ACM Conference on Computer and Communications Security (CCS ’10), OctFor more information, updates, and video of demonstration attacks, visit http://IndiaEVM.org. Security Analysis of Ind

Add to Reading List

Source URL: indiaevm.org

Language: English - Date: 2015-04-05 09:49:52
86National security / Surveillance / Electronic commerce / Security guard / Computer security / Security / Crime prevention / Public safety

IT Security system in Latvia achievements, statistics and challenges DSS Conference, Riga, Baiba Kaškina, CERT.LV

Add to Reading List

Source URL: cert.lv

Language: English - Date: 2013-11-07 15:18:51
87Computer network security / Software testing / OWASP / Security / Cloud computing / Web application security / Application security / Penetration test / Application firewall / Computing / Computer security / Cyberwarfare

1 2 Welcome to OWASP AppSec USA 2011, an application security conference for information security and development enthusiasts building software - which plays such a vital role in our lives - to be more

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-10-02 12:13:04
88CORBA / Common Object Request Broker Architecture / Component-based software engineering / Inter-process communication / Object-oriented programming / Authorization / Access control / Service-oriented architecture / Computer security / Security / Computing / Identity management

In Proceedings of the Annual Computer Security Applications Conference, Phoenix, Arizona, U.S.A., December 6-10, 1999 A Resource Access Decision Service for CORBA-based Distributed Systems Konstantin Beznosov Baptist He

Add to Reading List

Source URL: cadse.cs.fiu.edu

Language: English - Date: 2000-01-27 15:46:10
89Cyberwarfare / Honeypot / Penetration test / Application security / Web application security / Network security / Vulnerability / Microsoft Security Essentials / Security / Computer network security / Computing / Computer security

HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:21
90Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
UPDATE