Computer security conference

Results: 514



#Item
361Science / Research methods / Survey methodology / Market research / Ticket to Work / Mode effect / Social Security Disability Insurance / Computer-assisted telephone interviewing / Response rate / Statistics / Data collection / Sampling

Assessment of Bias When Field Operations Are Curtailed in a Mixed-Mode Telephone and Face-to-Face Survey of Persons with Disabilities May 13, 2011 Presentation to the AAPOR Annual Conference

Add to Reading List

Source URL: www.mathematica-mpr.com

Language: English - Date: 2014-07-07 11:49:51
362SQL / Computer languages / Relational database management systems / OWASP / Security / Java Persistence Query Language / Password / Data Definition Language / Computing / Data management / Query languages

Top  Ten  Proac+ve     Web  Applica+on  Defenses     Top  Five  Proac+ve   Mobile  Controls    

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:33
363Cyberwarfare / Internet / Data / Internet protocols / Database caching / Memcached / Spoofing attack / URL shortening / Firewall / Computer network security / Computing / Denial-of-service attacks

SSRF pwns: new techniques and stories @ONsec_lab: http://lab.onsec.ru Alexander Golovko Vladimir Vorontsov

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:33
364Notary / Public-key cryptography / Computer security / Contract law / Non-repudiation

You Can Be Anything You Want to Be: Breaking Through Certified Crypto in Banking Apps Andrew Petukhov (Founder/CTO, Solidlab) George Noseevich (PhD student, MSU) Dennis Gamayunov (Acting Head, Information Systems

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:34
365Cyberwarfare / Public safety / National Cyber Security Division / Year of birth missing / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / Critical infrastructure protection / National Protection and Programs Directorate / Computer security / National security / United States Department of Homeland Security / Security

Bridging ridging to the Future – Emerging Trends in Cybersecurity Bios/Abstracts Conference presentations will be posted to the FISSEA website, www.fissea.org

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-03-14 01:00:00
366Software testing / Hacking / Cyberwarfare / Aircraft Communications Addressing and Reporting System / Vulnerability / Automatic dependent surveillance-broadcast / Aviation / Avionics / TESO / Computer security

Aircraft Hacking Practical Aero Series © 2013, n.runs Professionals - Security Research Team - April[removed]Hugo Teso

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:34
367Year of birth missing / Computer crimes / United States Department of Homeland Security / National Cyber Security Division / Angela Orebaugh / International Multilateral Partnership Against Cyber Threats / Lance Hoffman / Government / Computer security / Cyberwarfare / Security / Public safety

25th Annual Conference “A New Era in Cybersecurity Awareness, Training, and Education” National Institute of Standards & Technology, Gaithersburg, Maryland Tuesday, March 27, 2012

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-27 08:13:08
368Cyberwarfare / Computer crimes

DELEGATE PROGRAM Conference Programs Sponsored by: CYBER SECURITY FOR WATER AND

Add to Reading List

Source URL: www.cwwa.ca

Language: English - Date: 2014-06-11 10:13:58
369Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
370Computer security / Access token / Security / Federated identity / Cloud standards / Computing / OAuth

OAuth 2.0 and the Road to XSS: attacking Facebook Platform Andrey Labunets — @isciurus Who is @isciurus •

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:34
UPDATE