Insecurity

Results: 1427



#Item
291Cross-platform software / Vulnerability / Pointer / Computer insecurity / Java / C / Software / Software bug / Computing / Software engineering / Computer programming

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: cybersecurity.ieee.org

Language: English - Date: 2015-05-01 08:08:57
292Internet / Tor / Onion routing / Traffic analysis / Relay / Proxy server / Computer insecurity / Freenet / I2P / Software / Internet privacy / Computing

Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-03-07 16:53:15
293Computing / Data security / Embedded system / Universal Serial Bus / Router / Computer security / Firewall / Security appliance / Server appliance / Computer network security / Computer hardware

A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University {ang,sal}@cs.columbia.edu

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:35
294Computer network security / Software testing / Cross-platform software / JavaScript / Computer security / Internet privacy / Evaluation / Vulnerability / Computer insecurity / Computing / Security / Cyberwarfare

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-09 11:36:39
295Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
296Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
297Levant / Amal Movement / Charbel Nahas / Politics of Lebanon / Asia / Lebanese Civil War / Lebanon

Because the Lebanese are living in fear from insecurity and from the return of civil war, Because the State’s incapacity to carry out its functions in all areas: security, politics, services, etc., is now threatening t

Add to Reading List

Source URL: beta.charbelnahas.org

Language: English - Date: 2013-06-10 01:42:12
298

FOOD INSECURITY BY ZIP CODEData)

Add to Reading List

Source URL: www.threesquare.org

- Date: 2014-03-12 12:20:54
    299Cheating / Sociology / Sports law / Online game / Multiplayer online games / Multiplayer video games / Games

    Multiplayer Online Games Insecurity [Re]Vuln Luigi Auriemma & Donato Ferrante

    Add to Reading List

    Source URL: revuln.com

    Language: English - Date: 2013-04-04 19:34:02
    300Bangladesh / Republics / Dhaka / Economic globalization / Globalization / Poverty reduction / Outline of Bangladesh / Foreign relations of Bangladesh / Asia / Political geography / Economy of Bangladesh

    bangladesh Inequality on the rise Economic globalization is severely damaging economic and social rights. GDP growth has been accompanied by increasing inequality, mounting food insecurity and constraints on “positive

    Add to Reading List

    Source URL: old.socialwatch.org

    Language: English - Date: 2008-11-06 08:06:04
    UPDATE