Cyber Operations

Results: 233



#Item
141Public safety / Computing / Computer law / Federal Information Security Management Act / Security controls / Information security / United States Department of Homeland Security / NIST Special Publication 800-53 / Computer security / Data security / Security

Cyber Security Analyst, FEMA Program Federal Emergency Management Agency (FEMA), Independent Security Operations, Oversight, and Assessment and Authorization (ISO2A2) Support Duties/Responsibilities: Supports the develop

Add to Reading List

Source URL: nnoa.memberclicks.net

Language: English - Date: 2014-07-30 21:46:10
142Public safety / National security / Crime prevention / Information security / Federal Information Security Management Act / Federal Emergency Management Agency / Security controls / National Institute of Standards and Technology / Computer security / Security / Data security

Senior Cyber Security Analyst, FEMA Program Federal Emergency Management Agency (FEMA), Independent Security Operations, Oversight, and Assessment and Authorization (ISO2A2) Support Duties/Responsibilities: Provides dire

Add to Reading List

Source URL: nnoa.memberclicks.net

Language: English - Date: 2014-07-30 21:46:08
143Public safety / Software testing / Information security / National security / Federal Emergency Management Agency / Vulnerability / Security / Computer security / Data security

Senior Cyber Security Engineer, FEMA Program Federal Emergency Management Agency (FEMA), Independent Security Operations, Oversight, and Assessment and Authorization (ISO2A2) Support Duties/Responsibilities: Provides dir

Add to Reading List

Source URL: nnoa.memberclicks.net

Language: English - Date: 2014-07-30 21:46:11
144Military / Electronic warfare / USACEWP / Full-spectrum dominance / Military doctrine / Information warfare / Command and control warfare / Fleet Electronic Warfare Center / Cyber electronic warfare / Cyberwarfare / Military science / Information operations

Microsoft Word - FM 3-36 FEF01_4Feb09.docm

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
145National security / Data security / Nessus / Federal Emergency Management Agency / Information security / Computer security / Security / Public safety

Cyber Security Engineer, FEMA Program Federal Emergency Management Agency (FEMA), Independent Security Operations, Oversight, and Assessment and Authorization (ISO2A2) Support Duties/Responsibilities: Engineers maintain

Add to Reading List

Source URL: nnoa.memberclicks.net

Language: English - Date: 2014-07-30 21:46:09
146Security / Unified threat management / Managed security service / Vulnerability / Threat / Firewall / Network security / Information security / Computer network security / Cyberwarfare / Computer security

Level 3 Managed Security Services Comprehensive Unified Threat Management Defending against cyber threats, protecting your operations, and safeguarding the information entrusted to your care is a large, complex, and cons

Add to Reading List

Source URL: caleidoscopesolutions.com

Language: English - Date: 2014-07-07 15:47:32
147Cyberinfrastructure / United States Cyber Command / United States Strategic Command / Air Staff / Central Intelligence Agency / Information warfare / National Security Agency / 318th Information Operations Group / David J. Dorsett / Military / Net-centric / Cyberwarfare

ICT Supply Chain Risk Management Workshop Bio - John Toomer

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-10-12 13:48:55
148United States Cyber Command / United States Strategic Command / United States Air Force / Electronic warfare / Air Force Cyber Command / Battlespace / Air Force Research Laboratory / Air Force Network Integration Center / Military science / Military / Cyberspace

Headquarters U.S. Air Force Integrity - Service - Excellence Air Force Cyber Operations Command

Add to Reading List

Source URL: www.au.af.mil

Language: English - Date: 2012-01-04 11:26:24
149Electronic warfare / War / Hacking / Military technology / Nuclear program of Iran / Stuxnet / Duqu / Computer crime / Cyber Operations / Cyberwarfare / Military science / Military

Microsoft Word - Iran's cyber posture

Add to Reading List

Source URL: www.openbriefing.org

Language: English - Date: 2013-11-19 12:58:33
150United States Cyber Command / Lackland Air Force Base / Air Education and Training Command / Twenty-Fourth Air Force / Joint Base San Antonio / United States Department of the Air Force / Recruit training / 318th Information Operations Group / Texas Air National Guard / United States Air Force / Texas / United States

A P U B L I C AT I O N O F T H E[removed]n d A I R B A S E W I N G JOINT BASE

Add to Reading List

Source URL: www.jbsa.af.mil

Language: English - Date: 2013-03-11 09:01:33
UPDATE