Cyberwarfare

Results: 11990



#Item
941Computer network security / Malware / Software quality / Application software / Vulnerability / Threat / Rootkit / Microsoft Security Essentials / Software / Cyberwarfare / Computer security / Computing

Why Wassenaar Arrangement’s Definitions of Intrusion Software and Controlled Items Put Security Research and Defense At Risk—And How To Fix It Sergey Bratus, D J Capelis, Michael Locasto, Anna Shubina October 9, 2014

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-10-09 10:35:01
942Computer security / Cyberwarfare / Crime prevention / National security / Network security / Information security / Internet security / Firewall / Access control / Computer network security / Security / Data security

Cyber & Information a s s u ra n c e Land Mobile Radio System Product & Services Offerings

Add to Reading List

Source URL: pspc.harris.com

Language: English - Date: 2014-05-22 09:41:34
943Internet / Electronic warfare / Hacking / Military technology / Internet ethics / Network neutrality / Cyberwarfare / Mobile banking / Computer crime / Technology / Computer law / Computing

CYFY 2015 14th to 16th October VOLUME III ISSUE 5

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2015-05-12 02:15:49
944Computer security / Cyberwarfare / United States Department of Homeland Security / Gaithersburg /  Maryland / National Institute of Standards and Technology / United States Computer Emergency Readiness Team

Microsoft PowerPoint - FFC Building Workshop CSET

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2015-03-25 14:08:26
945Standards / Emergency management / Motivation / Psychological resilience / Resilience / Public safety / Information Technology Infrastructure Library / Cyberwarfare / PRINCE2 / Management / Information technology management / Method engineering

AXELOS overview We are a joint venture between the UK Government Cabinet Office and Capita plc. AXELOS is the custodian of proven Global Best Practice – ITIL® and PPM (including PRINCE2® and MSP®).

Add to Reading List

Source URL: www.axelos.com

Language: English - Date: 2014-12-22 08:02:23
946Data breach / Data security / Secure communication / Identity theft / Anthem / Cyberwarfare / Crime / Security / Computer security / Computer network security

55 Elm Street P.O. Box 120 Hartford, CTGEORGE JEPSEN ATTORNEY GENERAL

Add to Reading List

Source URL: www.ct.gov

Language: English - Date: 2015-02-10 14:51:33
947Denial-of-service attack / Internet Relay Chat / Computing / Fortinet / Small form-factor pluggable transceiver / OSI protocols / Computer network security / Denial-of-service attacks / Cyberwarfare

FortiDDoS TM DDoS Attack Mitigation Appliances The Ever-changing DDoS Attack

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:33
948Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16
949Password / Public key certificate / Security / Cryptographic protocols / Cyberwarfare / Computer security / Secure communication / Public-key cryptography / Key management / Electronic commerce

Microsoft Word - Create New Accountdocx

Add to Reading List

Source URL: www.act.org

Language: English - Date: 2015-05-11 11:13:27
UPDATE