Control system security

Results: 2384



#Item
291International security / United Nations Institute for Disarmament Research / Disarmament as Humanitarian Action / United Nations System / Disarmament / Stockholm International Peace Research Institute / United Nations Office at Geneva / Nuclear Non-Proliferation Treaty / Nuclear disarmament / Arms control / International relations / Peace

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
292Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Google Chrome / Malware / Software / Computing / Cloud clients

This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2012-03-08 13:27:49
293International security / Peace / United Nations Institute for Disarmament Research / Disarmament as Humanitarian Action / Disarmament / Nuclear Non-Proliferation Treaty / United Nations System / Nuclear proliferation / Nuclear disarmament / Arms control / International relations / Nuclear weapons

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
294Windows XP / System software / McAfee / Microsoft Windows / Companies listed on the New York Stock Exchange / Zero-day attack / Vulnerability / Microsoft Security Essentials / Malware / Computer security / Antivirus software / Software

Solution Brief McAfee Application Control Extends the  Life of Legacy Microsoft Windows XP System

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-22 07:04:03
295International security / United Nations Institute for Disarmament Research / Conference on Disarmament / Disarmament / United Nations System / United Nations Office at Geneva / Nuclear Non-Proliferation Treaty / Stockholm International Peace Research Institute / Nuclear disarmament / Arms control / International relations / Peace

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
296Business / Computer security / Data security / Corporations law / Internal audit / Audit / Corporate governance / Internal control / Operational risk / Auditing / Security / Risk

Systems to Ensure Sound Business Operations ■ The Shoko Chukin Bank’s Governance System The change in status from that of a government-affiliated financial institution to a special company (a joint-stock company est

Add to Reading List

Source URL: www.shokochukin.co.jp

Language: English - Date: 2013-09-20 02:45:59
297Computer security / Identity management / Password strength / Password cracking / Password / Access control / Security

Summary Report: TESTBED AS400 System: Analysis Date: S65E570C 03-Nov-2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:28:41
298System software / Internet Control Message Protocol / Ping / Traceroute / TCP/IP stack fingerprinting / Computer network security / ICMP Address Mask Request / Path MTU Discovery / Denial-of-service attacks / Computing / Internet protocols / Internet

ICMP Usage in Scanning Version 2.01 ICMP Usage in Scanning1 Or

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:28
299Internet / RADIUS / Security / Access control / Network access server / Authentication / Internet protocols / Internet standards / Computing

PortaSwitch: External System Interfaces Guide MR44

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2014-11-17 08:41:48
300Cross-platform software / National Security Agency / Security-Enhanced Linux / Mandatory access control / TOMOYO Linux / Embedded Linux / Linux kernel / Operating system / Linux Security Modules / Computer security / Computer architecture / Software

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Sergey Bratus Sara Sinclair

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:09
UPDATE