Cyberwarfare

Results: 11990



#Item
191Epidemiology / Physics / Medicine / Vaccination / Cyberwarfare / Computer network security / Computer security / Threat / Faster-than-light / Infection / Influenza / Malware

Internet wormholes Can security patches travel faster than light? A reliable strategy for controlling the propagation of malicious software has become and will likely remain the Holy Grail of network security in the fore

Add to Reading List

Source URL: www.monmeetings.org

Language: English - Date: 2015-09-04 10:25:02
192Technology / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Joint Light Tactical Vehicle / FIPS 140-2 / Global Positioning System / Telematics

Microsoft Word - 4RidgeFinalSEPres_08092103_0920.docx

Add to Reading List

Source URL: www.ndia-mich.org

Language: English - Date: 2013-08-19 10:06:02
193Hacking / Cyberwarfare / Fiction / Computer security / Firefly / Vulnerability / Application security / Web browser / Cross-site scripting

PDF Document

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-03-06 11:28:34
194Computer security / Software / System software / Antivirus software / Cyberwarfare / Freeware / Computer virus / Deception / Internet security / Malware / Rootkit / Avira

D-OGS Newsletter – March 2011 News & Articles of Interest to Durham-Orange genealogists PO Box 4703, Chapel Hill, NCdues – $20 Sue McMurray - President

Add to Reading List

Source URL: dogsnc.org

Language: English - Date: 2014-11-02 21:31:56
195Computing / Computer network security / Cyberwarfare / Technology / Security / National research and education network / Internet2 / Firewall / Internet / Computer security

PO BoxLawrence, KS9800 www.kanren.net

Add to Reading List

Source URL: www.kanren.net

Language: English - Date: 2016-04-18 09:55:25
196Computer security / Computing / Computer network security / Cyberwarfare / Security / Videotelephony / Data security / Integrated Services Digital Network / Network access / Security Target / Firewall / Oids

gsmyndigheten for IT-sikkerhet Norwegian Certificattion Authority for IT Security Sertifisering SERTIT T-012 MR Main ntena

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:40
197Cyberwarfare / Cybercrime / Computer security / Security / Computer network security / Social engineering / Phishing / Spamming / .tk / Threat / Crimeware / Ransomware

THREAT REPORT FortiGuard Eye of the Storm THREAT REPORT: FORTIGUARD EYE OF THE STORM

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-02 16:40:40
198Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
199Cyberwarfare / Computer security / Security / Computing / International Multilateral Partnership Against Cyber Threats / Registered Investment Adviser / Cyber-security regulation / Cybersecurity CS5L CMM

Cybersecurity Guidance for Registered Investment Advisers Client Alert May 5, 2015 On April 28, the Securities and Exchange Commission (SEC) released a Guidance Update addressing the importance of cybersecurity and the s

Add to Reading List

Source URL: www.womensprivateequitysummit.com

Language: English - Date: 2016-02-09 09:34:19
200Espionage / Security / Targeted threat / Prevention / Cyberwarfare / Hacking / Safety / Computer security

The Spy Kittens Are Back: Rocket Kitten 2 Cedric Pernet

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2015-09-01 14:42:40
UPDATE