Control system security

Results: 2384



#Item
791Computer network security / McAfee / Computer networking / Antivirus software / Secure Computing / Proxy server / Malware / Firewall / Content filtering / Computing / System software / Computer security

Technology Blueprint Living with Social Media Secure and control social media and the Web 2.0 world

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:53
792Incident management / Computing / Computer security / Password / Incident commander / Access control / Email / EAuthentication / System administrator / Public safety / Emergency management / Firefighting in the United States

SOUTHERN AREA INTERAGENCY INCIDENT MANAGEMENT ANNOUNCEMENT/APPLICATION WEBSITE ANNOUNCEMENT CLOSES: Extended to November 1, 2013 OBJECTIVES: To build and maintain teams of highly qualified and motivated specialists who a

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2015-02-18 01:16:54
793Computer network security / Computer networking / Cyberwarfare / Data security / Firewall / New API / Pcap / Transmission Control Protocol / Kernel / Software / Computing / System software

PDF Document

Add to Reading List

Source URL: svn.ntop.org

Language: English - Date: 2014-05-06 09:37:20
794Wireless / Bangladesh Cricket Board / Cricket in Bangladesh / Turnstile / Radio-frequency identification / Access control / Security / Sports

Project Summary VAST Patron Access Control System for Bangladesh Cricket Board The Customer: The Bangladesh Cricket Board (BCB) is the main governing body for Cricket in Bangladesh. The Board has its headquarters in Dhak

Add to Reading List

Source URL: www.umd.com.au

Language: English - Date: 2011-08-01 20:43:49
795WAN optimization / System software / Anti-spam / Content filtering / Spam filtering / Traffic shaping / Security appliance / Management / Proxy server / Network performance / Computing / Server appliance

Hospitality Visibility. Security. Control. HOW CONTENTWATCH CAN HELP YOU The CP Security Appliance FEATURES: VISIBILITY

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 14:31:26
796Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:20
797Internet / RADIUS / Security / Access control / Network access server / Authentication / Internet protocols / Internet standards / Computing

PortaSwitch: External System Interfaces Guide MR44

Add to Reading List

Source URL: www.portaone.com

Language: English - Date: 2014-11-17 08:41:48
798National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
799Fire alarm system / Firefighting / Fire protection / Elevator / Emergency exit / Fire drill / Door / Fire safety / Fire alarm control panel / Safety / Security / Prevention

FIRE EXIT PLAN MOUNTAIN SPRINGS – BUILDING A MOUNTAIN SPRINGS MEETING AREA: All occupants meet across Bullock Blvd in the west-side parking lot of the Church of Christ

Add to Reading List

Source URL: www.nmt.edu

Language: English - Date: 2015-02-05 15:50:04
800Fire alarm system / Fire protection / Elevator / Emergency exit / Fire drill / Door / Fire safety / Fire alarm control panel / Burglar alarm / Safety / Security / Prevention

FIRE EXIT PLAN PRESIDENTS HALL – FIRST FLOOR PRESIDENTS’ HALL EMERGENCY MEETING AREA: All occupants meet around the benches on the front, north side of Fitch Hall

Add to Reading List

Source URL: www.nmt.edu

Language: English - Date: 2015-02-05 15:50:08
UPDATE