Institute for Information Infrastructure Protection

Results: 94



#Item
1Computer security / Cybercrime / National security / Cyberwarfare / Computer network security / Threat / Cyberterrorism / Information security / Cyber-Insurance / Institute for Information Infrastructure Protection

Microsoft PowerPoint - SkillBridge Capabilities Statement

Add to Reading List

Source URL: www.skillbridgetraining.com

Language: English - Date: 2015-05-01 14:08:59
2Computer security / Security / Insider threat / Salvatore J. Stolfo / Insider / Institute for Information Infrastructure Protection / Threat / Cyber Insider Threat / Insider trading

Guest Editors’ Introduction Addressing the Insider Threat A

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
3Infrastructure / Cyberwarfare / Public safety / Security engineering / Critical infrastructure protection / Institute for Information Infrastructure Protection / Critical infrastructure / Cyberterrorism / Computer security / National security / United States Department of Homeland Security / Security

CYBER SECURITY: THE CHALLENGES FACING OUR NATION IN CRITICAL INFRASTRUCTURE PROTECTION HEARING BEFORE THE

Add to Reading List

Source URL: house.resource.org

Language: English - Date: 2003-04-08 15:00:00
4Technology / Security / Institute for Information Infrastructure Protection / SCADA / Nelson Rockefeller / Critical infrastructure protection / Sandia National Laboratories / Dartmouth / Critical infrastructure / Infrastructure / United States Department of Homeland Security / National security

Microsoft Word - ConferenceProgram2007.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2007-03-04 23:47:48
5Infrastructure / Institute for Information Infrastructure Protection / Critical infrastructure protection / Infrastructure security / Computer security / Cyberwarfare / Champaign–Urbana metropolitan area / Critical infrastructure / Marcus Sachs / National security / United States Department of Homeland Security / Security

Microsoft Word - ConferenceProgram2008.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2008-03-11 11:11:27
6Institute for Information Infrastructure Protection

Microsoft Word - ConferenceProgram2009.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2009-03-01 20:10:26
    7European Union directives / Law / European Union / Infrastructure for Spatial Information in the European Community / Data Protection Directive / Spatial data infrastructure / EULIS / Directive on the re-use of public sector information / Information privacy / Geographic information systems / Data privacy / Privacy law

    Harmonized Access to Heterogeneous Content: Towards a European SDI Aegidius Kap1, Bastiaan van Loenen1 and Marian de Vries2 Sections 1 Geo Information and Land Development and 2 GIS Technology OTB Research Institute for

    Add to Reading List

    Source URL: itcnt05.itc.nl

    Language: English - Date: 2005-02-27 17:00:00
    8Computer security / Computer network security / Crime prevention / Electronic commerce / National security / Trust / Institute for Information Infrastructure Protection / Data security / Information Trust Institute / Ethics / Security / Computer crimes

    National Cyber Leap Year Summit 2009

    Add to Reading List

    Source URL: tahoe-lafs.org

    Language: English - Date: 2014-12-16 18:34:05
    9Crime prevention / Computer security / Data security / Identity theft / Information security / Critical infrastructure protection / Institute for Information Infrastructure Protection / Risk / Business continuity planning / Security / National security / Public safety

    1001 PENNSYLVANIA AVE., NW SUITE 500 SOUTH WASHINGTON, DCTELFAX

    Add to Reading List

    Source URL: www.bits.org

    Language: English - Date: 2012-10-01 16:27:34
    10Computer network security / Crime prevention / National security / Secure communication / Institute for Information Infrastructure Protection / U.S. Department of Defense Strategy for Operating in Cyberspace / Security / Computer security / Cyberwarfare

    Oxford University Cyber Security Centre Techniques to combat these threats draw upon longstanding research in communications security – and also upon careful design so that systems and data collection are security-posi

    Add to Reading List

    Source URL: www.cybersecurity.ox.ac.uk

    Language: English - Date: 2015-02-04 08:27:13
    UPDATE