Control system security

Results: 2384



#Item
281ISO/IEC 27001 / Data security / ISO/IEC 27003 / Information technology management / ISO/IEC 27002 / BS / Information security management system / ISO/IEC 27004 / Accreditation / Computing / Computer security / Evaluation

Information Security Management ISO/IECand Internal Control

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:20:29
282Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
283Computing / Root name server / DNS root zone / Domain Name System Security Extensions / Extension mechanisms for DNS / Name server / Anycast / IPv6 / Transmission Control Protocol / Internet / Domain name system / Network architecture

Measurements of the Root Sever System RSSAC002 RSSAC Advisory on Measurements of the Root Server System !

Add to Reading List

Source URL: www.icann.org

Language: English - Date: 2015-05-31 03:11:58
284Electronic engineering / Cisco Wireless Control System / Wireless LAN controller / Cisco Systems / Wireless security / Wi-Fi / Wireless access point / IEEE 802.11 / Wireless network / Wireless networking / Technology / Wireless

Data Sheet Cisco Connected Stadium Wi-Fi Services Enhance the Mobile Fan Experience in the Venue with Cisco Connected Stadium Wi-Fi Services Overview

Add to Reading List

Source URL: www.servicesperspectives.com

Language: English - Date: 2014-09-23 15:51:08
285Business / Computer security / Data security / Corporations law / Internal audit / Audit / Operational risk / Corporate governance / Internal control / Auditing / Risk / Security

Systems to Ensure Sound Business Operations ■ The Shoko Chukin Bank’s Governance System The change in status from that of a government-affiliated financial institution to a special company (a joint-stock company est

Add to Reading List

Source URL: www.shokochukin.co.jp

Language: English - Date: 2014-09-28 20:01:06
286Cryptographic software / IOS / IPad / Multi-touch / Dropbox / Encrypting File System / Wireless security / Software / Computing / ITunes

“ The enterprise has full control of what files are shared, who they are shared with, and the level of security for each file and user. KRYPDOX

Add to Reading List

Source URL: www.asynchrony.com

Language: English - Date: 2014-09-08 17:05:38
287Building engineering / Active fire protection / Alarms / Building management system / Heating /  ventilating /  and air conditioning / Fire alarm control panel / Smoke detector / Fire alarm system / Facility management / Safety / Security / Prevention

Predictions for Smart Buildings in 2011Jim Sinopoli, PE, RCDD, LEED APSmart Buildings LLC

Add to Reading List

Source URL: www.smart-buildings.com

Language: English - Date: 2013-09-09 11:25:30
288Information systems / Computer security / Access control / Authorization / Human resource management system / Internet privacy / Electronic human resources / HRHIS / Human resource management / Security / Management

Virginia Polytechnic Institute and State University NoRev.: 3

Add to Reading List

Source URL: www.policies.vt.edu

Language: English - Date: 2013-08-06 11:47:17
289Auditing / Actuarial science / Data security / Internal audit / Operational risk / IT risk management / Asset liability management / Liquidity risk / Internal control / Risk / Security / Business

System to Ensure Proper Operations Risk Management Financial institutions are exposed to diverse and complex risk factors such as credit risk, market risk, liquidity risk and operational risk. This reflects the liberali

Add to Reading List

Source URL: www.shokochukin.co.jp

Language: English - Date: 2012-11-22 07:58:27
290Computer security / Access control / Identity management / Authorization / Lightweight Directory Access Protocol / EXist / PERMIS / Security / XACML / Computing

Advanced Access Authorization Technology White Paper: XACML Policy Enforcement System

Add to Reading List

Source URL: viewds.com

Language: English
UPDATE