Control system security

Results: 2384



#Item
971FACT SHEET ADVISORY BOARD ON DISARMAMENT MATTERS Mandate The Secretary-General’s Advisory Board on Disarmament Matters was established in 1978 pursuant to paragraph 124 of the Final Document of the Tenth Special Sessio

FACT SHEET ADVISORY BOARD ON DISARMAMENT MATTERS Mandate The Secretary-General’s Advisory Board on Disarmament Matters was established in 1978 pursuant to paragraph 124 of the Final Document of the Tenth Special Sessio

Add to Reading List

Source URL: unoda-web.s3.amazonaws.com

Language: English - Date: 2015-01-06 13:53:17
972Managed Web Proxy Service Comprehensive Defence And Control

Managed Web Proxy Service Comprehensive Defence And Control

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2014-02-19 04:12:34
973Swiss Cyber Storm II Case: NFS Hacking Axel Neumann <axel.neumann@csnc.ch>  Compass Security AG

Swiss Cyber Storm II Case: NFS Hacking Axel Neumann Compass Security AG

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:27
974(Second and Final) DRAFT Special Publication[removed]Revision 2, Guide to Industrial Control Systems (ICS) Security

(Second and Final) DRAFT Special Publication[removed]Revision 2, Guide to Industrial Control Systems (ICS) Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-09 09:58:03
975Public Safety Solutions Higher levels of surveillance CCTV surveillance Video analytics

Public Safety Solutions Higher levels of surveillance CCTV surveillance Video analytics

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-07-29 04:12:34
976The Swiss Federal Department of Foreign Affairs and DCAF invites you to attend a briefing on the  Draft Charter for the Oversight Mechanism of the International Code of Conduct for Private Security Service Providers (ICo

The Swiss Federal Department of Foreign Affairs and DCAF invites you to attend a briefing on the Draft Charter for the Oversight Mechanism of the International Code of Conduct for Private Security Service Providers (ICo

Add to Reading List

Source URL: www.icoc-psp.org

Language: English - Date: 2014-01-20 09:17:00
977A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-01-07 00:22:22
978Integrated Security Solutions  http://www.nec.com/security/ 101025_iss_brochure_v08_japan_G.indd 1

Integrated Security Solutions http://www.nec.com/security/ 101025_iss_brochure_v08_japan_G.indd 1

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-07-29 04:12:31
979Special Issue on Solutions for Society - Creating a Safer and More Secure Society  For the security and safety of critical infrastructure Centralized Information Control System Supporting Safe and Stable Shinkansen

Special Issue on Solutions for Society - Creating a Safer and More Secure Society For the security and safety of critical infrastructure Centralized Information Control System Supporting Safe and Stable Shinkansen

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2015-01-20 23:46:08
980Lab notebooks going digital

Lab notebooks going digital

Add to Reading List

Source URL: oa.helmholtz.de

Language: English - Date: 2014-07-04 03:03:59