Conference on Security

Results: 2278



#Item
281Cyberwarfare / Honeypot / Penetration test / Application security / Web application security / Network security / Vulnerability / Microsoft Security Essentials / Security / Computer network security / Computing / Computer security

HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:21
282Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
283Merchant services / Credit cards / Credit card / Card security code / Bank card number / Fee / Visa Inc. / Payment / Business / Economics / Electronic commerce

AAAI-08 Exhibitor Contract July, 2008 Chicago, Illinois, USA The undersigned (hereinafter called the "Exhibitor") hereby applies for exhibit space at the Twenty-Third AAAI Conference on Artificial Intelligence, A

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-12-15 23:27:11
284Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
285Peace / United Nations Conference on the Illicit Trade in Small Arms / Human rights instruments / Firearms / SALW / Small arms / Weapon of mass destruction / Confidence and security-building measures / Small Arms Survey / Arms control / International relations / Gun politics

A/CONFProgramme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects I.

Add to Reading List

Source URL: reachingcriticalwill.org

Language: English - Date: 2012-01-04 14:51:00
286System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007 ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall

Add to Reading List

Source URL: www.csd.uoc.gr

Language: English - Date: 2007-09-12 11:58:26
287Presidents of the United Nations Security Council / Identity / African-Americans in foreign policy / Credential / Identity management / Knowledge

Third United Nations Conference on the Law of the SeaConcluded at Montego Bay, Jamaica on 10 December 1982 Document:-

Add to Reading List

Source URL: legal.un.org

Language: English - Date: 2013-09-27 13:21:55
288Forced migration / Politics / United Nations Assistance Mission in Afghanistan / Internally displaced person / Afghanistan / Taliban / International Security Assistance Force / Refugee / International Conference on Afghanistan /  London / War in Afghanistan / Asia / Politics of Afghanistan

Afghanistan 22 November 2013 Prepared by OCHA on behalf of the Humanitarian Country Team

Add to Reading List

Source URL: reliefweb.int

Language: English - Date: 2013-12-26 08:44:05
289International Criminal Court / Crime of aggression / War crimes / Human rights instruments / War of aggression / Crimes against humanity / Universal jurisdiction / Genocide / United Nations Security Council / Law / International relations / International criminal law

United Nations Diplomatic Conference of Plenipotentiaries on the Establishment of an International Criminal Court, volume II, 1998 : Summary Records – 9th Plenary meeting

Add to Reading List

Source URL: legal.un.org

Language: English - Date: 2013-09-27 13:18:19
290Computing / Wireless sensor network / IEEE Communications Society / International Conference on Information Processing in Sensor Networks / Wireless security / Telecommunications engineering / Association for Computing Machinery / Ambient intelligence / Support / Wireless networking / International nongovernmental organizations / Technology

Peng Ning (As of MarchDepartment of Computer Science North Carolina State University Telephone: (Email: ; URL: http://www.csc.ncsu.edu/faculty/ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 18:58:42
UPDATE