National Security Service

Results: 5871



#Item
101Security / Prevention / Safety / Computer security / National security / Crime prevention / Data security / United States government secrecy / Insider threat / Defense Security Service / Security clearance / Classified information

DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICETelegraph Road, Quantico, VAINDUSTRIAL SECURITY

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2016-05-25 14:48:49
102Information technology management / Computing / Security / Data security / Crime prevention / Cryptography / Information governance / National security / SolarWinds / Security information and event management / Information security / Computer security

c a s e stu dy LegacyTexas Bank LegacyTexas Bank is a full-service community bank serving businesses and families

Add to Reading List

Source URL: solarwinds-marketing.s3.amazonaws.com

Language: English - Date: 2011-11-07 16:07:35
103Centers for Disease Control and Prevention / Emergency management / United States Public Health Service / United States Department of Health and Human Services / Association of Public Health Laboratories / National Health Security Strategy / Public Health Emergency Preparedness / Strategic National Stockpile / Emergency Preparedness / National Association of County and City Health Officials / Preparedness / Public health emergency

Public Health Preparedness Capabilities: National Standards for State and Local Planning March 2011 Centers for Disease Control and Prevention

Add to Reading List

Source URL: www.nwwihcc.org

Language: English - Date: 2016-02-26 10:19:05
104Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Enterprise application integration / SOA Security / Decentralization / Software as a service / Cloud computing

Issue LXI • AprilReducing Application Cost and Risk through Centralized SOA Security by Mamoon Yunus, CEO of Crosscheck Networks

Add to Reading List

Source URL: servicetechmag.com

Language: English - Date: 2012-04-24 20:38:15
105Government / Civil service in the United States / National Security Personnel System / Equal Employment Opportunity Commission / United States Department of Homeland Security / United States Department of Defense / United States federal executive departments

Department of the Navy EEO Program Status Report FY 2011 EEOC FORM

Add to Reading List

Source URL: www.secnav.navy.mil

Language: English - Date: 2016-02-23 18:11:05
106Computer security / Computing / Security / Computer network security / Data security / Cryptography / National security / Cloud computing security / Vulnerability / Threat / Security controls / Service Organization Controls

SO C 2 CO MP LIA N CE ACHIEVING SOC 2 COMPLIANCE WITH THREAT STACK As a service provider storing and handling large amounts of customer data, you’re tasked with minimizing risk and exposure to this data. Inadequate se

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:56:01
107

Testimony of Admiral Michael S. Rogers, USN Director, National Security Agency Chief, Central Security Service before the Senate Select Committee on Intelligence

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2015-09-25 15:36:59
    108Crime prevention / Cryptography / Information governance / National security / Computer security / Internet privacy / Privacy / Information security / Intellectual property / Acceptable use policy / Information privacy law / Terms of service

    Box Acceptable Use Policy at the University of Utah Box.com is cloud storage that provides users with the ability to easily store, access and share files and folders anywhere they can connect to the Internet. As a user o

    Add to Reading List

    Source URL: it.utah.edu

    Language: English - Date: 2015-03-06 09:53:02
    109Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

    Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

    Add to Reading List

    Source URL: www.casos.cs.cmu.edu

    Language: English
    110

    2012 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service

    Add to Reading List

    Source URL: www.aipsi.org

    Language: English
      UPDATE