The “high” security setting may prevent some Web sites from functioning properly, so use the highest setting that still allows for effective Web browsing. As new ways to exploit computer software ...
The scope of this publication includes: computer-based systems, the compromise of which could adversely affect nuclear security or nuclear safety; the State’s and relevant entities roles and ...
This publication establishes guidance addressing the challenge of applying computer security measures to instrumentation and control (I&C) systems at nuclear facilities. The measures are intended to ...
The first step in improving the security and privacy of information contained in federal computer systems. Signed January 8, 1988 by President Reagan, the Act: Establishes a central authority for ...
Security and Privacy studies the protection of information and systems in various computer science domains: operating/distributed system security, software security ...
Core infrastructure including financial, medical and military systems, water, gas and oil pipelines, the electrical grid, communications, weather forecasting, GPS navigation/guidance systems and other ...
Fundamental knowledge in major computer security topics — including cyber threats, malware, information assurance, authorization, applied cryptography, web security, mobile and wireless security, ...
Designed to provide a foundation in computer ethics, computer architecture and operating systems with a specific emphasis on their security. It will introduce the ethical theories affecting ...
security, robotics, parallel computation, data mining, computer architecture, or systems software. Personalize Your Degree: Explore various areas within computer science, from artificial intelligence ...
Computer information systems is a catchall term for the computing platforms, software programs and applications ... the niche field of information systems security is dedicated to safeguarding ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果