Search for: "C2 Securities" Results 41 - 60 of 145
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Feb 2023, 5:16 am by Michael P. Fischerkeller
Conceptions of security derive from strategic environments, of which three—nuclear, conventional, and cyber—coexist with their own distinct conceptions of security. [read post]
15 Aug 2011, 6:05 pm by thesoulpractitioner
Folks, when I say this product makes for a secure mounting solution, I mean BOMBPROOF! [read post]
13 Jun 2018, 8:04 pm by Sabrina I. Pacifici
  As the authors describe it, they “found a common interest in legal barriers to security” during the Internet & Society course and together “began to engage with the reality that some security researchers – particularly academics – were concerned about potential legal liability under computer crime laws. [read post]
17 Apr 2010, 4:28 pm by legalinformatics
Here is the abstract: Public key infrastructure (PKI) enables the secure and private exchange of data using an unsecure public network, such as the Internet. [read post]
15 Jul 2013, 2:54 pm by Nicholas Gebelt
  This is because secured creditors have special rights attached to the collateral securing the debts. [read post]
29 Jun 2022, 7:01 am by Michael P. Fischerkeller
Cyberspace is a strategic competitive environment where continuous activity short of use of force has cumulatively threatened international peace and stability. [read post]
25 Apr 2012, 9:20 am by Greg Nojeim
Lofgren would fix the "use for national security" problem:Lofgren #25 - permits use only for cyber and when there is probable cause of a violation of a Wiretap Act predicate [read post]
24 Dec 2022, 9:34 am by Bill Budington
The malware uses a number of obfuscation techniques to hide its true functionality: connecting to a C2 server via the tor network, and adding your device to a botnet controlled by malicious hackers in order to launch attacks. [read post]
20 Oct 2015, 6:56 pm by Kirby Blanchard
A dredge, seeking to secure position for anchoring, lowered its dredge ladder and cutter head into the seabed, striking a pipeline. [read post]
7 May 2009, 7:40 pm
Examples of voluntary manslaughter include: 1) Getting into a brawl at a bar and hitting someone over the head with a beer container, causing death. 2) Where a burglar breaks into a warehouse and comes across a security guard, who he knocks down a flight of stairs, resulting in the guard’s death. [read post]
20 Aug 2011, 9:35 am by thesoulpractitioner
When I fold the grommets behind the iPad it makes for a secure hold. [read post]
3 Sep 2023, 4:43 pm by INFORRM
The new policy claims the collection of biometric information is “for safety, security, and identification purposes. [read post]
9 Mar 2012, 8:56 am by thesoulpractitioner
I used the included 3M tape to secure it on the dash. [read post]
20 Oct 2023, 6:56 am by Gavin Wilde
Automation is likely to permeate more strategic-level tasks, from command and control (C2) to  management, logistics, and training – for which the integrity, quality, and veracity of underlying data will be pivotal. [read post]
18 Nov 2010, 3:06 pm by Pamela Pengelley
Network Security • Liability Surrounding Social Media Sites and Tools • Design and Implementation of an Incident Response Plan • Claims, Claims, Claims: A Privacy Breach Dissected If you are interested in attending, you can register at this link. [read post]