<--- Back to Details
First PageDocument Content
Computer network security / Crime prevention / National security / Federal Information Security Management Act / International Multilateral Partnership Against Cyber Threats / National Institute of Standards and Technology / National Strategy for Trusted Identities in Cyberspace / Information security / National Cybersecurity Center / Security / Computer security / Cyberwarfare
Date: 2014-03-26 10:58:55
Computer network security
Crime prevention
National security
Federal Information Security Management Act
International Multilateral Partnership Against Cyber Threats
National Institute of Standards and Technology
National Strategy for Trusted Identities in Cyberspace
Information security
National Cybersecurity Center
Security
Computer security
Cyberwarfare

Testimony of Donna F. Dodson Chief Cybersecurity Advisor National Institute of Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: nist.gov

Download Document from Source Website

File Size: 199,15 KB

Share Document on Facebook

Similar Documents

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

A Paged Domain Name System for Query Privacy Daniele E. Asoni, Samuel Hitz, and Adrian Perrig Network Security Group Department of Computer Science, ETH Zürich {daniele.asoni,samuel.hitz,adrian.perrig}@inf.ethz.ch

DocID: 1xVqa - View Document

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

EECS 388 Intro to Computer Security October 14, 2016 Project 3: Network Security

DocID: 1xUDb - View Document

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

Massachusetts Institute of Technology 6.857: Network and Computer Security Professor Ron Rivest Handout 6 April 22, 2014

DocID: 1v7im - View Document

Managing Computer Security Incident Response Teams (CSIRTs)  “Can you business survive and recover from network attacks and intruder threats?”

Managing Computer Security Incident Response Teams (CSIRTs) “Can you business survive and recover from network attacks and intruder threats?”

DocID: 1uOLO - View Document

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

Causality-based Sensemaking of Network Traffic for Android Application Security∗ Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg, VA, USA {haozhang, danf

DocID: 1uMv5 - View Document