Cryptography

Results: 21893



#Item
991The Creation of CAMEO (Conflict and Mediation Event Observations): An Event Data Framework for a Post Cold War World DEBORAH J. GERNER, PHILIP A. SCHRODT, OMUR YILMAZ Department of Political Science, University of Kansas

The Creation of CAMEO (Conflict and Mediation Event Observations): An Event Data Framework for a Post Cold War World DEBORAH J. GERNER, PHILIP A. SCHRODT, OMUR YILMAZ Department of Political Science, University of Kansas

Add to Reading List

Source URL: eventdata.parusanalytics.com

Language: English - Date: 2014-09-12 09:44:52
992Microsoft PowerPoint - BBNS-GS NATO Capabilities Overview_December 14, 2015 v09 DM

Microsoft PowerPoint - BBNS-GS NATO Capabilities Overview_December 14, 2015 v09 DM

Add to Reading List

Source URL: www.cybersecurity.cz

Language: English - Date: 2016-04-17 12:12:36
993Drive Encryption Procedure Drive Encryption End User Guide (Revision Date: Table of Contents Introduction ......................................................................................................

Drive Encryption Procedure Drive Encryption End User Guide (Revision Date: Table of Contents Introduction ......................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-05-16 15:09:57
994MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-10-04 12:30:49
995On the Impact of Touch ID on iPhone Passcodes Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov University of British Columbia, Vancouver, Canada {icherapau,ildarm,nalin,beznosov}@ece.ubc.ca

On the Impact of Touch ID on iPhone Passcodes Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, Konstantin Beznosov University of British Columbia, Vancouver, Canada {icherapau,ildarm,nalin,beznosov}@ece.ubc.ca

Add to Reading List

Source URL: www.usenix.org

Language: English
996International Electronic Commerce Law -------------------------------------------------------------------------------------------------------------------------------------OVERVIEW The Information Revolution is transformi

International Electronic Commerce Law -------------------------------------------------------------------------------------------------------------------------------------OVERVIEW The Information Revolution is transformi

Add to Reading List

Source URL: www.gian.iitkgp.ac.in

Language: English
997Senior Computer Network Administrator / Information System Security Officer (ISSO) Candidate Requirements: • Experience with Information Technology, Information Security and Information Assurance • Ability to work wi

Senior Computer Network Administrator / Information System Security Officer (ISSO) Candidate Requirements: • Experience with Information Technology, Information Security and Information Assurance • Ability to work wi

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2016-08-02 13:19:19
998Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ATM S.A. Data Center ATMAN

Certificate of Registration INFORMATION SECURITY MANAGEMENT SYSTEM - ISO/IEC 27001:2013 This is to certify that: ATM S.A. Data Center ATMAN

Add to Reading List

Source URL: ru.atman.pl

Language: English - Date: 2015-09-18 06:10:27
999HP Prime Technology Corner 10 The Practice of Statistics for the AP Exam, 5e  Section 4-1, P. 215 TECHNOLOGY CORNER 10. Choosing an SRS on the HP Prime

HP Prime Technology Corner 10 The Practice of Statistics for the AP Exam, 5e Section 4-1, P. 215 TECHNOLOGY CORNER 10. Choosing an SRS on the HP Prime

Add to Reading List

Source URL: www.hpprime.de

Language: English - Date: 2014-09-09 06:12:34
1000The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

The Next Cyber Security Threat: Export Controls The debate around cybersecurity tools and terrorists has been raging between government entities (US and non-US) and the computer industry for the last couple of years. The

Add to Reading List

Source URL: nsclab.org

Language: English - Date: 2016-06-20 22:48:36