Cyberwarfare

Results: 11990



#Item
21Computer network security / Computing / Security / Videotelephony / Cyberwarfare / Internet privacy / Network architecture / Secure communication / Videoconferencing / Virtual private network / Endpoint / Computer security

NARBHAnet Documentation of Security Measures for Clinical Videoconferencing Connections This form is required as written documentation that security measures are in place for all videoconference endpoints and connections

Add to Reading List

Source URL: www.rbha.net

Language: English - Date: 2013-04-11 02:24:06
22Security / Prevention / Cyberwarfare / Cybercrime / National security / Safety / Computer security / Cyber-security regulation / Politics and technology / International Federation for Information Processing / Cyber / Lecture Notes in Computer Science

TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail: http://tylermoore.ens.utulsa.edu/ tel: +

Add to Reading List

Source URL: tylermoore.ens.utulsa.edu

Language: English - Date: 2016-03-24 11:13:01
23Software / System software / Computing / Arxan Technologies / Antivirus software / Cyberwarfare / Mobile security / Android / Computer security / Avira / Malware / Anti-tamper software

Arxan Best Practices White Paper Effective Mobile Application Security Strategies TABLE OF CONTENTS

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:53:33
24Security / Prevention / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / National Security Agency

YOUR COUNTRY NEEDS YOU: HERE’S HOW TO ANSWER THE CALL! BRIGADIER GENERAL JOHN ADAMS, US ARMY (RET) & LIEUTENANT COLONEL CHRIS COURTNEY, US ARMY (RET)

Add to Reading List

Source URL: nssp.unm.edu

Language: English - Date: 2012-02-22 13:09:17
25Computing / Spamming / Cyberspace / Cyberwarfare / Computer network security / Multi-agent systems / Botnets / Email spam / MessageLabs / Anti-spam techniques / Festi / Proofpoint /  Inc.

MessageLabs Intelligence: NovemberIntroduction Welcome to the November edition of the MessageLabs Intelligence monthly report. This report provides the latest email threat trends for November 2005 to help in

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:20
26Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-07-18 23:27:59
27Malware / Cyberwarfare / Computer security / Ransomware / Cybercrime / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 13:00:18
28Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
29Cyberwarfare / Computer virus / Deception / Internet security / AIDS / Antivirus software / Comparison of computer viruses / Abraxas

VIRUS BULLETIN MARCH … VIRUS ANALYSIS 2 Olympic Games Mikko Hypponen

Add to Reading List

Source URL: www.virusbulletin.com

Language: English - Date: 2016-08-02 05:30:54
30Computer network security / Security / Computing / Cyberwarfare / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless LAN / Access control / Health Insurance Portability and Accountability Act / Computer security / Payment Card Industry Data Security Standard

Microsoft Word - Enable Networks HIPAA Compliance draft v1.doc

Add to Reading List

Source URL: www.powercloudsystems.com

Language: English - Date: 2013-04-08 21:26:42
UPDATE