FREE ELECTRONIC LIBRARY - Abstracts, books, theses

Pages:     | 1 |   ...   | 4 | 5 ||


-- [ Page 6 ] --

18. Davidson, P., Cyberspies have hacked into power grid, officials say, in USA Today. 2009.

19. Clarke, R.A. and R.K. Knake, Cyberwar. 2010: HarperCollins.

20. Gallaher, M.P., A.N. Link, and B.R. Rowe, Cyber Security, Economic Strategies and Public Policy Alternatives. 2008: Edward Elgar.

21. Securing Critical Infrastructure in the Age of Stuxnet, Sean P. McGurk, acting director of the Homeland Security Department's Cybersecurity Center, in US Senate Homeland Security and Governmental Affairs Committee. November 17, 2010.

22. Cappelli, D., et al., Common Sense Guide to Prevention and Detection of Insider Threats, 3rd Edition (Version 3.1). 2009, Carnegie Mellon University.

23. Christie, C.J., Former UBS Computer Systems Manager Gets 97 Months for Unleashing “Logic Bomb” on Company Network. US DOJ Press Release (News), December 13, 2006.

24. Conference Report to Accompany H.R. 3288, Department of Transportation and Housing and Urban Development, and Related Agencies Appropriations Act, 2010, Dec. 8, 2009.

25. Baker, W., et al., Data Breach Investigations Report, http://www.verizonbusiness.com/go/2011dbir.

2011: Verizon Business.

26. Baker, W., et al., Data Breach Investigations Report, http://www.verizonbusiness.com/go/2010databreachreport/. 2010: Verizon Business.

27. Verizon Business, Verizon Incident Sharing Metrics Framework, http://securityblog.verizonbusiness.com/2010/02/19/veris-framework. 2010.

28. National Vulnerability Database. Available from: http://nvd.nist.gov/.

29. Anti-Phishing Working Group, Phishing Activity Trends Report, 2nd Qtr. 2010.

30. Deloitte Touche Tohmatsu (DTT), Media Predictions TMT Trends 2009. 2009.

31. Cisco Systems, Cisco Global Threat Report 4Q2010. 2011.

32. Dasient Blog, The Dasient Q4 Malware Update. 2011.

33. Sinclair, G., C. Nunnery, and B.B.H. Kang. The waledac protocol: The how and why. in Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on. 2009.

34. The VeriSign® iDefense® Intelligence Operations Team, Mobile Threats. November 13, 2009, VeriSign® iDefense®

35. Kwan, M., Hack Any RFID-Enabled Credit Card for Eight Bucks in Mobile Magazine. 2008.

36. McAfee Labs, McAfee Threats Report: Fourth Quarter 2010. 2011.

37. United States Computer Emergency Readiness Team, Cyber Threats to Mobile Devices 2010, USCERT.

38. Sims, S., Insider Threat Investigations, in Cyberforensics, J. Bayuk, Editor. 2010, Springer.

39. United States of America versus Albert Gonzalez. 2010, United States District Court, District of New Jersey.

40. Stamos, A., Aurora and Advanced Persistent Threat Response Recommendations. 2010, iSEC Partners.

41. Herley, C., So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users, in New security paradigms workshop. 2009, ACM: Oxford, United Kingdom.

42. FS-ISAC Account Takeover Task Force, On-line Fraud Detection White Paper. 2011.

43. Bayuk, J., Securing Web Applications in CSO Executive Series on Application Security, CXO Media, January, 2009.

44. Gammage, B., et al., Gartner's Top Predictions for IT Organizations and Users, 2011and Beyond.


45. Ponemon Institute, U.S. Cost of a Data Breach Study, http://www.ponemon.org. 2010.

46. Wingfield, N., I. Sherr, and B. Worthen, Hacker Raids Sony Videogame Network, in Wall Street Journal. 2010.

47. McMillan, R., Epsilon: A watershed for an industry under siege, in ComputerWorld. 2011.

48. Gramm–Leach–Bliley Act, US 106-102. 1999.

49. Sarbanes-Oxley Act, US116 Stat. 745. 2002.

50. Payment Card Industry (PCI) Security Standards Council, Payment Card Industry (PCI) Data Security Standard, Version 1.2. 2008.

51. HIPAA, Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule, US Department of Health and Human Services, Editor. 2003: Federal Register Vol. 68, No. 34.

52. Wolf, C., Proskauer on Privacy. 2008, Practicing Law Institute.

53. United States Computer Emergency Readiness Team, Malware Threats and Mitigation Strategies.

2005, US-CERT.

54. Delta-Risk, I., Cyber-Attack Against Payment Processes February 2010 FS-ISAC Exercise After Action Report. 2010, US Financial Services Sharing and Analysis Center.

55. Arbor Networks, Worldwide Infrastructure Security Report, Volume VI. 2010.

56. BITS, BITS Email Security Toolkit. 2007, The Financial Services Roundtable,

Pages:     | 1 |   ...   | 4 | 5 ||

Similar works:

«TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Penalty Cases for Failure to Disclose Reportable Transactions Were Not Always Fully Developed December 10, 2010 Reference Number: 2011-30-004 This report has cleared the Treasury Inspector General for Tax Administration disclosure review process and information determined to be restricted from public release has been redacted from this document.Redaction Legend: 1 = Tax return/Return Information Phone Number | 202-622-6500 Email Address |...»

«Pelvic Radiotherapy for Women Your treatment explained Patient Information Introduction This booklet has been written to help answer some of the questions you or those who care for you may have about pelvic radiotherapy. You will usually have been offered this treatment because you have cervical cancer, which affects the neck of the uterus (womb), or endometrial cancer, which affects the lining of the womb. However pelvic radiotherapy is sometimes also given to women with cancer of the bowel,...»

«Children’s Advocacy Institute TESTIMONY TO THE COMMISSION TO ELIMINATE CHILD ABUSE AND NEGLECT FATALITIES BY THE CHILDREN’S ADVOCACY INSTITUTE MADISON, WISCONSIN JULY 15, 2015 Good afternoon, Chairman Sanders, Commissioners and staff. After working alongside many dedicated advocates to help get the Protect Our Kids Act passed, it is deeply gratifying and a great honor to have the opportunity to present our testimony here today. You may have gotten used to seeing me as I have closely...»

«UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2014 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission File Number: 001-33708 PHILIP MORRIS INTERNATIONAL INC. (Exact name of registrant as specified in its charter) Virginia 13-3435103 (State or other...»

«Valuer-General Victoria and Municipal Group of Valuers Specialist Property Guidelines for Marinas August 2011 For more information about DSE visit www.dse.vic.gov.au or contact the DSE Customer Service Centre on 136 186 For information about the Municipal Group of Valuers visit www.mgv.com.au Published by the Victorian Government Department of Sustainability and Environment, Melbourne, August 2011. © This publication is copyright. No part may be reproduced by any process except in accordance...»

«Chapter 2 Morphological and Functional Ear Development Carolina Abdala and Douglas H. Keefe The aim of argument, or of discussion, should not be victory, but progress. —Joseph Joubert 1 Introduction The development of peripheral auditory function in humans has been observed and documented using a variety of investigative tools. Because these tools must all be noninvasive in nature, they are indirect and, therefore, somewhat imprecise probes of function. Measured function at one level of the...»

<<  HOME   |    CONTACTS
2017 www.sa.i-pdf.info - Abstracts, books, theses

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.