Cyberwarfare

Results: 11990



#Item
311Security / Computer security / Cyberwarfare / Secure communication / Computer network security / Data security / Cybercrime / Data breach / Health Insurance Portability and Accountability Act / Vulnerability / Attack / Threat

Breach Prevention and Management: A HIPAA Perspective Nicholas P. Heesters, Jr., JD, CIPP HHS Office for Civil Rights

Add to Reading List

Source URL: www.ehcca.com

Language: English - Date: 2016-05-04 11:38:29
312Cryptography / Security / Cyberwarfare / Military communications / Mass surveillance / National Security Agency / National security / RSA Security / Crypto Wars / Global surveillance disclosures / Communications security / STU-III

Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail accounts and stealing intellectual

Add to Reading List

Source URL: jnslp.com

Language: English - Date: 2015-03-04 13:43:21
313Espionage / Cyberwarfare / Rogue software / Cybercrime / Computing / Identity theft / Keystroke logging / Spyware / Surveillance / Screenshot / Computer keyboard / Internet privacy

Defeat Spyware With Anti-Screen Capture Technology Using Visual Persistence Johnny Lim Netrust 10 Collyer Quay, #09-05 Ocean Building, Singapore

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
314Cyberwarfare / Security / Computing / Directorate General for Communications Networks /  Content and Technology / Rseaux IP Europens Network Coordination Centre / World Wide Web / DG / Computer security / Denial-of-service attack

Internet Security An “Edgy” Business Jaap Akkerhuis, NLnetLabs Daniel Karrenberg, RIPE NCC Overview

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:02
315Cyberwarfare / Computing / Computer security / Computer network security / National security / Cryptography / Denial-of-service attack / Malware / Threat / Information security / Vulnerability / Antivirus software

Available online at www.postmodernopenings.com e-ISSN: 2069–9387; ISSN–L: 2068–0236 Postmodern Openings 2016, Volume 7, Issue 1, June, pp

Add to Reading List

Source URL: drwho.virtadpt.net

Language: English - Date: 2016-07-04 18:56:05
316Security / Cyberwarfare / Computer security / Cybercrime / Hacking / National security / Cooperative Cyber Defence Centre of Excellence / Cyber-attack / Stuxnet / Jason Healey / Mandiant / Jeffrey Carr

Software Manufacturer Liability JEFFREY CARR RESPONSIBLE ATTRIBUTION: A PREREQUISITE FOR ACCOUNTABILITY

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2016-08-12 06:44:11
317Computing / Security / Technology / Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / Microsoft

Die Fakultät für Informatik der Universität Wien lädt Sie in Kooperation mit Microsoft, SBA Research und dem KIRAS-Projekt CERT Komm 2 herzlich ein zum CS-Colloquium Preventing, detecting & responding to cyber-attack

Add to Reading List

Source URL: cs.univie.ac.at

Language: English - Date: 2016-07-18 07:13:48
318Security / Cyberwarfare / Cybercrime / Prevention / Computer network security / Computer security / Cryptography / National security / Medical device / Food and Drug Administration

April 21, 2016 Dr. Suzanne Schwartz Center for Devices and Radiological Health Food and Drug AdministrationNew Hampshire Ave., Bldg. 66, RmSilver Spring, MD

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2016-04-23 17:33:37
319Computer security / Security / Information governance / Cyberwarfare / Veracode / Corporate governance / Chief information security officer / Cyber-security regulation

VERACODE Survey Report.qxp_Layout:52 PM Page 1 Cybersecurity in the Boardroom A 2015 SURVEY

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-07-20 10:16:39
320Computer network security / Computer security / Cyberwarfare / Computing / Data security / Firewall / Network management / Antivirus software

Classics Department Computing Resources Guide This document is intended to provide quick guidance for new faculty, new graduate students, and research visitors in Classics and AHMA. Table of Contents CalNet ID—the esse

Add to Reading List

Source URL: ucbclassics.dreamhosters.com

Language: English
UPDATE