Control system security

Results: 2384



#Item
701Computer network / Virtual LAN / Windows Virtual PC / Transmission Control Protocol / System software / Software / VM

5 Application 5-1 A Report on the Experiment of Combined Operation via JGNⅡ MIWA Shinsuke and OHNO Hiroyuki To analyze security incidents and verify security measures, an environment is required that enables the user t

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 19:05:55
702Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
703Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
704Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
705Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
706EnGarde Secure Linux / Security-Enhanced Linux / Linux / Hardening / Mandatory access control / Security-focused operating system / Computer security / Software / Computing

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux (ABSTRACT) ABSTRACT 1. What is EnGarde Secure Linux? EnGarde Secure Linux is not just another "repackaged" Linux distribution, but a modern open source

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 09:03:34
707Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
708Software / Computer network security / Anti-spam / Barracuda Networks / Content-control software / Spam filtering / EMC NetWorker / Backup / Replication / Computing / System software / Backup software

Preserving History with Barracuda Backup About the Natural History Museum The Natural History Museum of Los Angeles County (NHM) is the largest natural and historical museum in the western United States. Its collections

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2014-08-28 19:06:11
709Internal control / Business / Data / Information / Auditing / Internal audit / IBM Information Management System

Extra Security Gisella Tan, aged 7 To Gisella, security is being surrounded by everything you need at home. What’s even better is the added comfort of a very secure chair with eight legs to sit on when you want to sett

Add to Reading List

Source URL: www.mpfa.org.hk

Language: English - Date: 2013-07-29 21:27:55
710Risk / Crime prevention / National security / Safety Integrity Level / IEC 61511 / Functional Safety / Safety instrumented system / IEC 61508 / Information security management system / Security / Safety / Prevention

Recommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1 Dennis Holstein (US), Virgil Hammond (US), Joe Weiss (US), Ajay Mishra (US), Andrew Ginter (US), Robert Abercrombie (US

Add to Reading List

Source URL: isa99.isa.org

Language: English - Date: 2015-03-07 11:37:44
UPDATE