TITLE

Thwarting Threats Using Academic Excellence

PUB. DATE
September 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p110
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the recognition of University of Houston as the national center of academic excellence in information assurance education in Houston, Texas. The university's goal of maintaining academic excellence in information technology has been supported by the National Security Agency. The university values integrity and security on its information systems security courses.
ACCESSION #
44064724

 

Related Articles

  • ALL AROUND NSA.  // National Public Accountant;Apr/May2004, Vol. 3 Issue 2, p24D 

    The article offers news briefs on a variety of issues related to the National Security Agency (NSA) in the U.S. The GE Independent Accountants Network (GE-IAN) is offering NSA members a $250 discount on licensing fees with Terra Securities Corp. NSA will hold its 59th annual convention at the...

  • National INFOSEC Education & Training Program.  // Network Dictionary;2007, p329 

    An encyclopedia entry for "National INFOSEC Education & Training Program" is presented. It is an information security and training program from the National Security Agency (NSA).

  • The National Security Agency: Education Produces Protection. Summerfield, Brian // Chief Learning Officer;Sep2005, Vol. 4 Issue 9, p60 

    Focuses on the role of the Associate Directorate for Education and Training of the National Security Agency, the military arm of the Central Security Service, in developing and delivering learning programs for the organization in the U.S. Training of cryptologists globally; Maintenance of 62...

  • It's the REAL ID Act, stupid. Silva, Jeffrey // RCR Wireless News;5/22/2006, Vol. 25 Issue 21, p10 

    The article criticizes the REAL ID Act which establishes minimum standards for state issuance of drivers' licenses and identification cards in the U.S. It comments on the effectiveness of the reported partnership of the National Security Agency with Bellsouth Corp. and Verizon Communications to...

  • Telephone companies 'off the hook'. Abdul-Aleem, Maryam // New York Amsterdam News;7/31/2008, Vol. 99 Issue 32, p40 

    The article reports on the Foreign Intelligence Surveillance (FISA) bill, a retroactive immunity received by the telecommunication companies for their cooperation with the U.S. government's unwarranted wiretapping programs. The bill allows the government broad spying powers in National Security...

  • Clipper.  // Network Dictionary;2007, p103 

    A definition of the term "Clipper" is presented. Developed by the U.S. National security Agency, the "clipper" is a chip for voice and other information encryption. The "clipper" chip's functions are classified and has an acknowledged trap door in it to let the government identify anyone who is...

  • Clipper Chip.  // Network Dictionary;2007, p103 

    A reference entry for the term "Clipper chip" is presented. The term refers to the chip protected by the U.S. National Security Agency and made for voice and other information encryption. The chip is said to be tamper-resistant and has a crytographic processor, which makes the Skipjack...

  • DECRYPTING THE FOURTH AMENDMENT: WARRANTLESS NSA SURVEILLANCE AND THE ENHANCED EXPECTATION OF PRIVACY PROVIDED BY ENCRYPTED VOICE OVER INTERNET PROTOCOL. Jordan, David Alan // Boston College Law Review;May2006, Vol. 47 Issue 3, p505 

    Information to, from, and about U.S. persons routinely comes into the possession of the National Security Agency (the "NSA") through the lawful warrantless surveillance of foreign persons abroad. The NSA's internal administrative guidelines allow such information to be disseminated to law...

  • NSA and the Dangers of Documents. Koprowski, Gene // EContent;Apr2006, Vol. 29 Issue 3, p8 

    This article reports on the guidelines released by the U.S. National Security Agency (NSA) to help other federal agencies contain digital content problems. Information-security problems caused by metadata are becoming a pressing issue for the government and many corporations, are concerned that...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics