Institute for Information Infrastructure Protection

Results: 94



#Item
21Harmonized Access to Heterogeneous Content: Towards a European SDI Aegidius Kap1, Bastiaan van Loenen1 and Marian de Vries2 Sections 1 Geo Information and Land Development and 2 GIS Technology OTB Research Institute for

Harmonized Access to Heterogeneous Content: Towards a European SDI Aegidius Kap1, Bastiaan van Loenen1 and Marian de Vries2 Sections 1 Geo Information and Land Development and 2 GIS Technology OTB Research Institute for

Add to Reading List

Source URL: www.agile-online.org

Language: English - Date: 2004-03-14 13:20:14
22GAO-04-140T Highlights, Critical Infrastructure Protection: Challenges in Securing Control Systems

GAO-04-140T Highlights, Critical Infrastructure Protection: Challenges in Securing Control Systems

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 20:46:27
23agile research for cybersecurity A New Approach Securing information systems from attack and compromise is a global problem of massive scope and scale. Cybersecurity can benefit from fundamental research that extends our

agile research for cybersecurity A New Approach Securing information systems from attack and compromise is a global problem of massive scope and scale. Cybersecurity can benefit from fundamental research that extends our

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-08-21 12:15:19
24MEETING THE CHALLENGE OF HOMELAND SECURITY Second Edition, October[removed]This report was produced through the contribution

MEETING THE CHALLENGE OF HOMELAND SECURITY Second Edition, October[removed]This report was produced through the contribution

Add to Reading List

Source URL: www.bayeconfor.org

Language: English - Date: 2010-03-29 16:02:29
25Enterprise Solutions  Information Security Services Enriched by intelligence from our Counter Threat Unit™ (CTU™) research team, Dell

Enterprise Solutions Information Security Services Enriched by intelligence from our Counter Threat Unit™ (CTU™) research team, Dell

Add to Reading List

Source URL: secureworkspublic.http.internapcdn.net

Language: English - Date: 2014-11-17 14:50:09
26Critical Infrastructure Security and Resilience National Research and Development Plan

Critical Infrastructure Security and Resilience National Research and Development Plan

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-12-29 15:49:01
27Four Grand Challenges in  TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003

Four Grand Challenges in TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:01:32
28Danube Reference Data and Service Infrastructure (DRDSI)

Danube Reference Data and Service Infrastructure (DRDSI)

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-09-30 12:17:42
29Combating the Insider Threat  2 May 2014 DISCLAIMER: This advisory is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding

Combating the Insider Threat 2 May 2014 DISCLAIMER: This advisory is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-05-06 13:13:58
30

PDF Document

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:39:21