Espionage

Results: 3893



#Item
491Power analysis / Espionage / Cryptography / Attack / Exploit / Hacking / Software testing / Cyberwarfare / Computer network security / Computer security

Microsoft PowerPoint - Example calculation of attack potential_v1.ppt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:45
492Government / Investigative journalism / The Washington Post / Top Secret America / Espionage / Security clearance / United States Department of Homeland Security / National Security Agency / Classified information / National security / Security / United States government secrecy

Precautionary Resources and Long Term Development Finance: The Financial Role of the Bretton Woods Institutions after the Crisis

Add to Reading List

Source URL: files.lsecities.net

Language: English - Date: 2013-01-16 10:41:51
493Rio Tinto Group / International nongovernmental organizations / Trade associations / BHP Billiton / Aluminum Corporation of China Limited / Rio Tinto Alcan / Alcan / International Council on Mining and Metals / Rio Tinto espionage case / Mining / Dual-listed companies / Mining companies of Canada

62389 RIO Tinto Annual Report Cover

Add to Reading List

Source URL: www.riotinto.com

Language: English - Date: 2011-07-05 10:24:25
494Espionage / Security / Cipher / RSA / ID-based encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Cramer–Shoup cryptosystem / ElGamal encryption / Public-key cryptography / Cryptography / Cyberwarfare

Ciphertext-Policy Attribute-Based Encryption

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:48
495Crime prevention / Law enforcement / National security / Surveillance / The Science of Spying / Countersurveillance / Product design / Privacy / Idea / Espionage / Security / Ethics

SPYMAKER: The Science of Spying Future Spy call for ideas SPYMAKER: The Science of Spying is a popular science exhibition opening at the Science Museum in February 2007 and touring internationally for 5 years. We invite

Add to Reading List

Source URL: foe.typepad.com

Language: English - Date: 2008-06-05 15:32:40
496Fabless semiconductor companies / Cryptography / Actel / Backdoor / Microsemi / Field-programmable gate array / Joint Test Action Group / Power analysis / Advanced Encryption Standard / Espionage / Electronic engineering / Electronics

Researchers’ response: Microsemi: Security claims with respect to ProASIC3 May 31, 2012 It was not our intention to make public disclosure at this time as the final paper “Breakthrough silicon scanning discovers back

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-06-01 10:28:42
497Director of Central Intelligence / Geospatial intelligence / National security / Espionage / Government / Scott F. Large / Central Intelligence Agency / McLean /  Virginia / National Geospatial-Intelligence Agency

Susan Gordon Deputy Director, NGA Susan (Sue) Gordon became the National Geospatial-Intelligence Agency’s (NGA) sixth Deputy Director on Jan. 1, 2015 after more than 25 years of service with the Central Intelligence Ag

Add to Reading List

Source URL: usgif.org

Language: English - Date: 2015-04-15 09:57:31
498Antivirus software / Malware / Rogue software / Computer network security / Spyware / Spybot – Search & Destroy / Computer virus / Microsoft Windows / Proprietary software / Software / System software / Espionage

Spyware – What Is It and How Do I Deal With It? Compiled by Hugh McClean Managing Director, PropertyPro (Suppliers of PropertyPro®) 12 AprilSpyware – What Is It and How Do I Deal With It?

Add to Reading List

Source URL: www.propertypro.co.uk

Language: English - Date: 2013-05-15 06:39:39
499Cipher / Cryptanalysis / Encryption / Espionage / Cryptography / Mathematical sciences / Science

Code Breakers The Great U-Boat Hunt Students will learn about the historical developments of cryptography and then apply this knowledge to decipher

Add to Reading List

Source URL: www.quantumvictoria.vic.edu.au

Language: English - Date: 2014-08-14 01:09:40
500Malware / Rogue software / Computer network security / Spyware / Spybot – Search & Destroy / Ad-Aware / Adware / Scareware / Real-time protection / Espionage / System software / Software

AFFIDAVIT OF VANESSA IP State of New York ) ) County of New York )

Add to Reading List

Source URL: www.benedelman.org

Language: English - Date: 2006-04-07 10:57:34
UPDATE