Institute for Information Infrastructure Protection

Results: 94



#Item
61FOR IMMEDIATE RELEASE Contact: Amy Pasquarello[removed]ext[removed]removed] FEDERAL AGENCIES WORK TO BALANCE THE CYBER

FOR IMMEDIATE RELEASE Contact: Amy Pasquarello[removed]ext[removed]removed] FEDERAL AGENCIES WORK TO BALANCE THE CYBER

Add to Reading List

Source URL: www.meritalk.com

Language: English - Date: 2014-02-20 17:53:27
62Microsoft Word - CSIIR-Wkshp-Theme2006.doc

Microsoft Word - CSIIR-Wkshp-Theme2006.doc

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2006-03-23 11:37:20
63Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Testimony of Cita M. Furlani Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-12-21 10:59:19
64CSIIR Workshop Theme This document is meant to help focus the CSIIR workshop participants in developing their individual presentations as well as to give context toward the common goal of developing our near term researc

CSIIR Workshop Theme This document is meant to help focus the CSIIR workshop participants in developing their individual presentations as well as to give context toward the common goal of developing our near term researc

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2005-02-27 20:20:42
65SECURITY CERTIFICATION CPE CREDITS FOR INSIDER THREAT PROGRAM TRAINING COURSE

SECURITY CERTIFICATION CPE CREDITS FOR INSIDER THREAT PROGRAM TRAINING COURSE

Add to Reading List

Source URL: insiderthreatdefense.com

Language: English - Date: 2014-03-31 13:18:09
66Prepared for Protecting Ourselves: A Rural Citizen’s Guide for Emergency Preparedness by the Institute for Infrastructure & Information Assurance at James Madison University. Copyright 2005 Printing in the U.S.A.

Prepared for Protecting Ourselves: A Rural Citizen’s Guide for Emergency Preparedness by the Institute for Infrastructure & Information Assurance at James Madison University. Copyright 2005 Printing in the U.S.A.

Add to Reading List

Source URL: www.jmu.edu

Language: English - Date: 2011-11-07 15:31:17
67Research Synopsis  Project 13d: Resource Allocation Based on Critical Infrastructure (Zimmerman) This project is developing quantitative indicators of critical infrastructure use, capacity, spatial distributional charact

Research Synopsis Project 13d: Resource Allocation Based on Critical Infrastructure (Zimmerman) This project is developing quantitative indicators of critical infrastructure use, capacity, spatial distributional charact

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2008-05-28 06:17:50
68Security Button On Keyboard

Security Button On Keyboard

Add to Reading List

Source URL: www.thei3p.org

Language: English - Date: 2014-04-17 14:53:08
69Four Grand Challenges in  TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003

Four Grand Challenges in TRUSTWORTHY COMPUTING Second in a Series of Conferences on Grand Research Challenges in Computer Science and Engineering November 16–19, 2003

Add to Reading List

Source URL: cra.org

Language: English - Date: 2010-01-24 23:36:55
701  Valedictory Lecture on 16th April,2010 at[removed]noon at the Indian Law Institute on the Cyber Law and Intellectual Property Rights Law in the Training Programme for Government Attorneys of Nepal from

1 Valedictory Lecture on 16th April,2010 at[removed]noon at the Indian Law Institute on the Cyber Law and Intellectual Property Rights Law in the Training Programme for Government Attorneys of Nepal from

Add to Reading List

Source URL: catindia.gov.in

Language: English - Date: 2012-07-07 08:24:38