Espionage

Results: 3893



#Item
201Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
202Graphics file formats / Steganalysis / Computer file formats / ISO standards / JPEG / Digital watermarking / Yass / Jessica Fridrich / Quantization / Cryptography / Espionage / Steganography

Modern Steganalysis Can Detect YASS Jan Kodovskýa , Tomáš Pevnýb ∗, Jessica Fridricha †, a Department of Electrical and Computer Engineering, Binghamton University, State University of New York

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-11-28 18:47:02
203Crime prevention / Counter-intelligence / Intelligence analysis / Military intelligence / Vulnerability / Computer security / United States Department of Defense / Counterintelligence / Critical infrastructure protection / Security / National security / Espionage

DETERMINATION OF THE SECRETARY OF DEFENSE

Add to Reading List

Source URL: open.defense.gov

Language: English - Date: 2015-04-29 07:15:24
204Intelligence analysis / Military intelligence / Counter-intelligence / United States Intelligence Community / Defense Intelligence Agency / Central Intelligence Agency / Open-source intelligence / Director of National Intelligence / Counterintelligence / Espionage / National security / Data collection

Microsoft Word - Documento1

Add to Reading List

Source URL: dpcld.defense.gov

Language: English - Date: 2013-10-18 16:52:18
205Espionage / Cyberwarfare / Military technology / Cryptography / Multiplexing / Electronic counter-countermeasures / Electronic warfare / Traffic analysis / Signals intelligence / Military science / Military communications / Telecommunications engineering

CHAPTER 19 Electronic and Information Warfare All warfare is based on deceptionhold out baits to entice the enemy. Feign

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:51:56
206United States government secrecy / Bureau of Diplomatic Security / Government / National security / Espionage / Security clearance

U.S. Department of State INTERAGENCY POST EMPLOYEE POSITION DESCRIPTION Prepare according to instructions given in Foreign Service National Handbook, Chapter 4 (3FAHPost 2. Agency

Add to Reading List

Source URL: photos.state.gov

Language: English - Date: 2015-06-05 09:26:06
207Category theory / Steganography / Embedding / Information theory / Steganalysis / Gibbs sampling / Line / Mathematics / Topology / Espionage

Steganography using Gibbs random fields Tomáš Filler Jessica Fridrich SUNY Binghamton

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2010-06-24 19:35:54
208Social engineering / Computer crimes / Spamming / Hacking / Botnets / Zeus / Man-in-the-browser / Hacktivism / Industrial espionage / Cybercrime / Computing / Malware

THE CURRENT STATE OF CYBERCRIME 2013 An Inside Look at the Changing Threat Landscape Cybercrime continues to diverge down different paths with each new year that passes. In 2013, cybercriminals are changing the way they

Add to Reading List

Source URL: www.emc.com

Language: English
209Portable software / Operations security / Opera / Software / Password / Espionage

Getting Started: Cadet Online Testing Step by Step Before You Start Gather the following information: 1. Your CAPID Number (six digit number found on your membership id card) 2. Last 4 digits of your social security numb

Add to Reading List

Source URL: capmembers.com

Language: English - Date: 2012-02-14 09:12:55
210Cyberwarfare / National security / Economic Espionage Act / Industrial espionage / International Traffic in Arms Regulations / Theft / Counterintelligence / Classified information / Espionage / Security / Trade secrets

PDF Document

Add to Reading List

Source URL: www.cdse.edu

Language: English - Date: 2015-04-17 13:59:07
UPDATE