Penetration

Results: 2049



#Item
151Cyberwarfare / Crime prevention / National security / Data security / Information security / Vulnerability / Threat / Penetration test / Security engineering / Security / Computer security / Computer network security

Microsoft Word - Document7

Add to Reading List

Source URL: iet.ucdavis.edu

Language: English - Date: 2015-05-11 13:14:38
152

Ronald Prins What’s happening out there? Cyberwar (MinDef) -Stuxnet -Electrical Grid penetration

Add to Reading List

Source URL: www.jaarcongresecp.nl

Language: English - Date: 2011-11-22 11:10:45
    153Security / Certified Information Systems Security Professional / Global Information Assurance Certification / (ISC)² / Information technology audit / ACIS / Information Systems Audit and Control Association / Penetration test / Computer security / Data security / Computing

    Prinya Hom-anek, CISSP, CSSLP, CRISC, SANS GIAC, GCFW President & Founder, ACIS Professional Centre, Thailand Member, (ISC)² Asian Advisory Board -------------------------------------------------------------------------

    Add to Reading List

    Source URL: www.informationsecurityasia.com

    Language: English - Date: 2012-07-19 00:22:00
    154

    Changes in the Economic Value of Variable Generation at High Penetration Levels: A Pilot Case Study of California

    Add to Reading List

    Source URL: www.csp-alliance.org

    Language: English - Date: 2012-06-12 07:58:28
      155Energy conversion / Low-carbon economy / Energy policy / Energy storage / Solar power / Photovoltaic system / Renewable energy / Photovoltaics / Energy development / Energy / Technology / Alternative energy

      Enabling Greater Penetration of Solar Power via the Use of CSP with Thermal Energy Storage

      Add to Reading List

      Source URL: www.csp-alliance.org

      Language: English - Date: 2012-01-06 09:16:19
      156Vulnerability / Evaluation / Penetration test / Security testing / Validation / Framework Programmes for Research and Technological Development / Software testing / Computer security / Cyberwarfare

      Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

      Add to Reading List

      Source URL: www.spacios.eu

      Language: English - Date: 2014-10-17 10:42:00
      157Cross-platform software / Computer security / Computer network security / Penetration test / Software testing / KDE / BackTrack / Linux distribution / White hat / Hacking / Computing / Software

      About the Course The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking professi

      Add to Reading List

      Source URL: www.silensec.com

      Language: English - Date: 2014-04-29 06:17:24
      158

      GNSS ITS USER FORUM - MEETING IV 15 April 2014, Paris Eurosites - 1 Place de la Pyramide- La Défense, Paris 21th Floor – Room « Sardaigne / Italie » HOW TO BOOST E-GNSS PENETRATION IN ITS?

      Add to Reading List

      Source URL: sunrise-project.eu

      Language: English - Date: 2014-04-10 11:06:13
        159

        MADISON Device implantation Under-water pipes junctions between in-piles device and pool penetration

        Add to Reading List

        Source URL: www-cadarache.cea.fr

        - Date: 2015-04-14 04:59:20
          160Tunnel / Boring / Rate of penetration / Technology / Engineering / Tunnels / Construction / Tunnel boring machine

          Rock Mechanics in Civil and Environmental Engineering – Zhao, Labiouse, Dudt & Mathier (eds) © 2010 Taylor & Francis Group, London, ISBN2 Geological controls on the breakthrough of tunnel boring machi

          Add to Reading List

          Source URL: dukelabs.com

          Language: English - Date: 2010-07-12 21:58:58
          UPDATE