<--- Back to Details
First PageDocument Content
Crime prevention / National security / Information technology audit / Computer network security / Public safety / Computer forensics / Certified Information Systems Security Professional / Information security / Department of Defense Cyber Crime Center / Security / Data security / Computer security
Date: 1999-11-05 00:00:00
Crime prevention
National security
Information technology audit
Computer network security
Public safety
Computer forensics
Certified Information Systems Security Professional
Information security
Department of Defense Cyber Crime Center
Security
Data security
Computer security

Computer Forensics in a LAN Environment Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds The industry has, at long last, accepted Computer Security as a ke

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 313,74 KB

Share Document on Facebook

Similar Documents

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division.  Nigel Smart, Professor of Cryptology,

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

DocID: 1xV9y - View Document

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1  Netherlands National Communication Security Agency (NLNCSA)

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xUSb - View Document

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

National Quantum Initiative Act The National Quantum Initiative Act establishes a federal program to accelerate quantum research and development for the United States’ economic and national security. Quantum Informatio

DocID: 1xTWc - View Document

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

Comparing the Usability of Cryptographic APIs Yasemin Acar, Michael Backes, Sascha Fahl, Simson Garfinkel∗ , Doowon Kim† , Michelle L. Mazurek† , and Christian Stransky CISPA, Saarland University; ∗ National Inst

DocID: 1xT8l - View Document