Computer security conference

Results: 514



#Item
131Event / Subroutines / ManaGeR / Vulnerability / Windows / JavaScript / Operating system / Features new to Windows XP / Event-driven SOA / Computing / Software engineering / Computer programming

Presented to the IFIP / SEC2002 Conference on Security in the Information Society : Visions and Perspectives, May 7-9, 2002, Cairo, Egypt, In Proceedings, Security in the Information Society: Visions and Perspectives, Kl

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2002-08-10 14:38:48
132Identity management / Conference call / Security / Computer security / Access control

Indico User Guide CERN Indico User Guide by CERN

Add to Reading List

Source URL: indico.ceta-ciemat.es

Language: English - Date: 2007-05-24 11:59:20
133Collaboration / Human-based computation / World Wide Web / Amazon Mechanical Turk / Web 2.0 / CAPTCHA / Computer security / Information extraction / Social information processing / Crowdsourcing / Computing

SIGCHI Conference Paper Format

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-10-25 13:05:10
134Security / EMC Corporation / RSA / Imperva / Malware / Vulnerability / Computer security / Computer network security / Cyberwarfare

CALL FOR ENTRIES: RSA® CONFERENCE 2010 INNOVATION SANDBOX

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-03-24 10:40:45
135RSA / Amit Yoran / Whitfield Diffie / Computer security / Ron Rivest / Cryptography / EMC Corporation / Computer network security

For More Information Kim DieselRSA® CONFERENCE 2015 OPENS TODAY IN SAN FRANCISCO

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-19 15:55:18
136Computing / Virus Bulletin / ESET / Avast! / BitDefender / Fortinet / F-Secure / International Computer Security Association / Kaspersky Lab / Antivirus software / Software / System software

Subject: Request to attend VB2015 Conference Dear [Decision maker], I’m writing to request your approval for me to attend VB2015 (the 25th Virus Bulletin International Conference) 30 September to 2 October in Prague, C

Add to Reading List

Source URL: www.virusbtn.com

Language: English - Date: 2015-02-04 08:35:55
137Reference / Cryptographic Module Validation Program / FIPS 140-2 / FIPS 140 / Cryptographic Module Testing Laboratory / FIPS 140-3 / National Voluntary Laboratory Accreditation Program / FIPS 201 / Federal Information Processing Standard / Cryptography standards / Evaluation / Computer security

Cryptographic Module Validation Program Where security starts …. 5th Annual NIST IT Security Automation Conference Randall J. Easter

Add to Reading List

Source URL: scap.nist.gov

Language: English
138Computer security / Usability / Academic conference / Knowledge / Technology / Academia / Security / USENIX Annual Technical Conference

Announcement and Call for Papers www.usenix.org/cset15/cfp 8th Workshop on Cyber ­Security Experimentation

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-17 16:07:29
139Computer network security / Multi-agent systems / Electronic commerce / Botnets / Internet bot / Rustock botnet / Denial-of-service attack / Web search query / Click fraud / Computing / Spamming / Internet

SBotMiner: Large Scale Search Bot Detection Fang Yu, Yinglian Xie, and Qifa Ke Microsoft Research Silicon Valley Mountain View, CAUSA fangyu,yxie,

Add to Reading List

Source URL: www.wsdm-conference.org

Language: English - Date: 2009-12-30 02:07:56
140Agencies of the European Union / Computer crimes / National security / Europol / Surveillance / Australian Federal Police / Law enforcement / Government / Crime

Federal Crime and Sentencing Conference 11 February 2012 CYBERCRIME Assistant Commissioner Neil Gaughan National Manager High Tech Crime Operations

Add to Reading List

Source URL: njca.com.au

Language: English - Date: 2013-07-18 02:52:16
UPDATE