Privacy engineering

Results: 1416



#Item
211Project management / Systems engineering process / Business case / Management / Technology / Intranet strategies / Computer networks / Internet privacy / Intranet

KM JULY 2009 Planning to demonstrate success

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:40:44
212Credit cards / Data privacy / Payment systems / Call centre / Interactive voice response / Computing / Payment Card Industry Data Security Standard / Electronic engineering / Cloud computing / Electronic commerce / Noble Systems Corporation / Computer law

S ERVICE B UREAU SUCCESS STORY

Add to Reading List

Source URL: www.noblesys.com

Language: English - Date: 2014-06-06 12:19:48
213Ubiquitous computing / Wireless / Technology / Automatic identification and data capture / Privacy / Radio-frequency identification

Passive Attacks on a Class of Authentication Protocols for RFID Basel Alomair, Loukas Lazos, and Radha Poovendran Network Security Lab. Electrical Engineering Department University of Washington

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2008-04-28 13:58:27
214GPS / Geolocation / Mobile technology / Navizon / Wireless Nodes Database / Internet privacy / Crowdsourcing / X Window System / Implementation / Technology / Computing / Software

A Long-Duration Study of User-TrainedLocalization Andrew Barry, Benjamin Fisher, and Mark L. Chang F. W. Olin College of Engineering, Needham, MA 02492 {andy, benjamin.fisher}@students.olin.edu, mark.chang@olin.e

Add to Reading List

Source URL: abarry.org

Language: English - Date: 2009-09-27 13:18:32
215Privacy / Internet privacy / Carrier cloud / Ethics / Computing / Cloud computing

Scientist’s perspective on security and privacy Andris Ambainis University of Latvia Software engineering is about ensuring that

Add to Reading List

Source URL: parleu2015.lv

Language: English - Date: 2015-04-21 01:54:54
216Computer crimes / Computer security / Malware / Vulnerability / Social engineering / Cloud computing / Phishing / Advanced persistent threat / Sotirios / Cybercrime / Computing / Cyberwarfare

Security and Privacy Research Challenges Sotiris Ioannidis Institute of Computer Science Foundation for Research and Technology - Hellas

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-11-07 15:06:11
217Systems engineering process / Computer networks / Internet privacy / Intranet

CM CMb 2010–16 Conducting an annual intranet review

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:22:35
218Computer networks / Internet privacy / Recruitment / Intranet / Systems engineering process / Job interview / Evaluation / Knowledge management / Project management / Management / Employment / Human resource management

KM MAY 2012 Hiring the best intranet people

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2015-05-09 02:37:51
219Computing / Dominator / Control flow graph / Static single assignment form / C / Compiler construction / Programming language theory / Software engineering

Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications Benjamin Livshits and Jaeyeon Jung Microsoft Research Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-08-07 18:14:03
220Internet / Computing / Social engineering / Phishing / Email / Internet privacy / Spamming / Confidence tricks / Cybercrime

STAY SAFE ONLINE ADVICE 5 TOP TIPS! 1. If its your own computer make sure you have an an-virus program and that it is up to date!

Add to Reading List

Source URL: www.scips.org.uk

Language: English - Date: 2013-09-17 07:27:42
UPDATE