Penetration

Results: 2049



#Item
281Building engineering / Thermal protection / Glass / Building envelope / Exterior insulation finishing system / Curtain wall / Architecture / Construction / Windows

Water penetration resistance of residential window installation options for hurricaneprone areas Forrest Masters, Assistant Professor, Ph.D., P.E. Department of Civil and Coastal Engineering University of Florida Project

Add to Reading List

Source URL: flash.org

Language: English - Date: 2011-08-20 18:40:02
282Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Social engineering / Application security / Attack / Computer security / Computer network security / Cyberwarfare

ACROS Security: ACROS Penetration Test, Frequently Asked Questions ACROS Penetration Test A Friendly โ€œAdvanced Persistent Threatโ€ Simulation Frequently Asked Questions 1.

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:09
283Standards / Software testing / Computer network security / National security / Professional certification / Software engineering / Software assurance / Penetration test / Software engineer / Security / Computer security / Cyberwarfare

Security Engineering Training A Framework for Corporate Training Programs on the Principles of Secure Software Development April 20, 2009 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:49
284Phasor measurement unit / Electric power transmission / SCADA / Power quality / Electrical grid / Electric power system / Power outage / High-voltage direct current / Energy management system / Electromagnetism / Electric power / Energy

Hitachi Review Vol), NoNext-generation SCADA/EMS Designed for Large Penetration of Renewable Energy

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:11
285Cyberwarfare / Honeypot / Penetration test / Application security / Web application security / Network security / Vulnerability / Microsoft Security Essentials / Security / Computer network security / Computing / Computer security

HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:21
286Renewable energy / Technological change / Fukushima Prefecture / Technology / Environment / Low-carbon economy / Appropriate technology / Environmental technology

FREA, Fukushima Renewable Energy Institute, AIST - for high penetration of renewable energyYoshiro OWADANO FREA February, 2015

Add to Reading List

Source URL: www.asiabiomass.jp

Language: English - Date: 2015-03-13 04:15:54
287Agronomy / Remote sensing / Mathematics / Dimensionless numbers / Observational astronomy / Leaf Area Index / Leaf angle distribution / Sky / Zenith / Biology / Plant morphology / Botany

1. ๐‰๐“ญ : The transmission coefficient for the diffuse radiation penetration. ๐œ‘=๐“ƒ ๐œ๐’น = 2ฮ”๐œ‘

Add to Reading List

Source URL: www.cid-inc.com

Language: English - Date: 2014-04-03 03:06:22
288Common Criteria / Security Target / Evaluation Assurance Level / Penetration test / Professional certification / Evaluation / Computer security / Thought

Indian CC Certification Scheme (IC3S) Certification Report Report Number: STQC/CCCR

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:45:30
289Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
290Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:30
UPDATE