Cyberwarfare

Results: 11990



#Item
231Prevention / Security / Safety / National security / Computer network security / Cyberwarfare / Computer security / Resilience / DHS National Protection and Programs Directorate / Enterprise risk management / Threat / Insurance

Microsoft Word - Regulatory and Market Imperatives Place Cyber Security High on Carrier Agendas - CMM Reprint

Add to Reading List

Source URL: www.brokerslink.com

Language: English - Date: 2015-04-27 09:55:18
232Security / Cyberwarfare / Contract law / Contract / Computer security

Model Operating Requirements Version 1 Consultation Draft Feedback Table (20121015_MOR_Feedback_Table)

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:33
233Security / Computer security / Prevention / National security / Cyberwarfare / Computer network security / Cryptography / NIST Special Publication 800-53 / Test and evaluation master plan / Vulnerability / Threat / Information security

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DCAUG

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 16:42:00
234Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
235Security / Computing / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Parser Grammar Engine / WECC / Pilot

Microsoft PowerPoint03_24 PGE 2016 WECC Low Impact Generation Pilot Project REV.3 Final

Add to Reading List

Source URL: www.wecc.biz

Language: English - Date: 2016-05-26 11:12:43
236Security / Safety / Prevention / Crime prevention / Industrial hygiene / Safety engineering / Cyberwarfare / Event management / Management / Emergency procedure / Security guard / Computer security

eGuide August 2015 Guidance for Events in UK Venues Security Sub-section

Add to Reading List

Source URL: www.aev.org.uk

Language: English - Date: 2016-03-10 10:40:45
237Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
238Security / Cyberwarfare / Computer security / Cryptography / Computer network security / Cybercrime / Malware / Internet privacy / Antivirus software / CrySyS Lab

Int. Secure Systems Lab Vienna University of Technology Identifying Dormant Functionality in Malware Programs Paolo Milani Comparetti

Add to Reading List

Source URL: oakland31.cs.virginia.edu

Language: English - Date: 2010-05-26 16:17:45
239Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
240Government / Security / Cyberwarfare / United States Department of Homeland Security / Computer security / International Multilateral Partnership Against Cyber Threats

CYBERSECURITY BUSINESS RESILIENCE Are your ready if disaster strikes? Event Agenda: 9:00 - 9:30 am Networking & Refreshments

Add to Reading List

Source URL: www.ct.org

Language: English - Date: 2016-06-21 16:46:01
UPDATE