IT Downloads Results for Type : ResearchShowing 1-4 of 4 Results
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.
This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation.
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities.