Control system security

Results: 2384



#Item
321Transmission Control Protocol / Microsoft SQL Server / Data / Network architecture / Computer network security / Internet protocols / Port / Computing

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for OctoberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 109,390 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:48
322Computer security / Identity management / Password strength / Password cracking / Password / Access control / Security

Summary Report: TESTBED AS400 System: Analysis Date: S65E570C 03-Nov-2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:28:41
323United Nations Institute for Disarmament Research / International security / United Nations System / United Nations Office at Geneva / Stockholm International Peace Research Institute / Disarmament / Nuclear proliferation / United Nations / Disarmament as Humanitarian Action / Arms control / International relations / Peace

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
324Data / Access control / Internet protocols / Identity management / Mobile content / Universal Plug and Play / Internet Key Exchange / IPsec / Smart card / Computing / Security / Cryptographic protocols

Inter-device Authentication and Authorization Framework: Demonstration System based on Novel Smart Card Software Manabu Hirano Department of Information and Computer Engineering Toyota National College of Technology 2-1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2008-07-21 13:42:26
325Security / Windows Vista / Windows NT architecture / Kernel / Ring / Operating system / Principle of least privilege / Architecture of Windows NT / Application software / Computer security / Computing / Computer architecture

User-Driven Access Control: A New Model for Granting Permissions in Modern Operating Systems Franziska Roesner∗ Qualifying Examination Project — April 19, 2011 Advised by Tadayoshi Kohno (UW) and Helen Wang (MSR)

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2011-07-13 02:26:31
326United Nations Institute for Disarmament Research / Patricia Lewis / United Nations Office for Disarmament Affairs / Disarmament / United Nations System / Nuclear proliferation / Nuclear disarmament / William Potter / Fissile Material Cut-off Treaty / Arms control / International relations / International security

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
327Computing / Common Criteria / Operating system / Validation / Hard disk drive / Protection Profile / Access control / FIPS 140-2 / Evaluation Assurance Level / Security / Evaluation / Computer security

Secure Systems Limited Silicon Data Vault Validation Report, VersionOctober 2005 National Information Assurance Partnership ®

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
328Cryptography / Computer security / System software / Linux Unified Key Setup / Encryption / Pre-boot authentication / Array controller based encryption / FreeOTFE / Disk encryption / Cryptographic software / Software

Encryption at Rest Proven Encryption Solutions to Protect Your Noble Data An important first step in taking control of information and helping to meet regulatory requirements is encrypting your contact center’s sensiti

Add to Reading List

Source URL: www.noblesys.com

Language: English - Date: 2010-08-04 10:24:20
329International security / United Nations Institute for Disarmament Research / United Nations System / Disarmament / Nuclear Non-Proliferation Treaty / Stockholm International Peace Research Institute / Nuclear disarmament / Nuclear proliferation / United Nations Office at Geneva / Arms control / International relations / Peace

UNITED NATIONS A General Assembly Distr.

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:42
330Cyberwarfare / System software / Network Access Control / Malware / Phishing / Advanced persistent threat / Threat / Avira / Antivirus software / Computer network security / Computer security

Case Study Security Matters at Valspar—and Bromium Is on It Company Snapshot INDUSTRY

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-05-22 19:24:47
UPDATE