Security University

Results: 12075



#Item
331Spamming / Spam filtering / Computing / Cyberspace / Email / Whitelist / DNSBL / The Spamhaus Project / Anti-spam techniques / Blacklist / Email spam / Open mail relay

Detecting Gray in Black and White Christian Rossow, Thomas Czerwinski, Christian J. Dietrich, Norbert Pohlmann Institute for Internet security University of Applied Sciences Gelsenkirchen, Germany {rossow|czerwinski|diet

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:21:58
332Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Online Certificate Status Protocol / Certificate authority / Public key certificate / Revocation list / Heartbleed / HTTPS

Leveraging DNS for timely SSL Certificate Revocation Eirini Degkleri1,2 , Antonios A. Chariton1 , Panagiotis Ilia1,2 Panagiotis Papadopoulos1,2 , Evangelos P. Markatos1,2 FORTH-ICS, Greece University of Crete, Greece 1

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:43
333Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:36
334Emergency management / Safety / 9-1-1 / Federal Communications Commission / Fire alarm system / Emergency / Prevention / Euthenics / Security

EMERGENCY RESPONSE PLANS – Missouri S&T REPORT ALL EMERGENCIES TO UNIVERSITY POLICE DIAL 911 ALWAYS BE PREPARED TO FOLLOW PROCEDURES IN CASE OF AN EMERGENCY

Add to Reading List

Source URL: ems.mst.edu

Language: English - Date: 2014-01-22 04:22:25
335Usability / User interfaces / Humancomputer interaction / Technical communication / User Research / User experience / System usability scale / Usability engineering / Usability of web authentication systems

Recommendations for a Graduate Seminar in Usable Security Kent Seamons Internet Security Research Lab Brigham Young University Provo, Utah, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:04
336Academia / Food and drink / Economics / Agricultural economics / Food industry / European Association of Environmental and Resource Economists / Applied economics / Food safety / Food security / Food / Swedish University of Agricultural Sciences / Jock R. Anderson

Curriculum Vitae Carl Johan Lagerkvist Personal details Name Date of birth Sex Language

Add to Reading List

Source URL: epidrift-ext.slu.se

Language: English - Date: 2015-02-13 11:48:19
337Freedom of information in the United States / Government / Security / Freedom of Information Act / Freedom of information laws by country / Public records / Internet privacy / FOIA / Computer security / NADDIS / FOIA Oversight and Implementation Act

Privacy and Security Notice “This Air Force ROTC Detachment 205 Website is provided as a public service by the Southern Illinois University. Information presented on the Detachment 205 Website is considered public info

Add to Reading List

Source URL: afrotc.siu.edu

Language: English - Date: 2015-09-28 14:25:30
338Computer access control / Exonumia / Token coin / IP address / Anonymous remailer / One-time password / Computer security / Access control / Computing

Do You Believe in Tinker Bell? The Social Externalities of Trust Khaled Baqer and Ross Anderson Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-02-02 10:23:17
339Privacy / Data security / Identity management / Law / Internet privacy / Government / Personally identifiable information / Prevention / Medical privacy / Privacy policy / Privacy concerns with social networking services

UC Irvine Privacy Impact Assessment The University has obligations to protect Personally Identifiable Information (PII) under state and federal laws and UC policies and values. PII is defined as any information that desc

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 19:33:16
340Password / Security / Email / Computing

MARIJUANAEnrollment Instructions MISSOURI UNIVERSITY OF SCIENCE & TECHNOLOGY MARIJUANA 101 is an online marijuana education course. You’ll need access to an internet connected computer and an email address. To r

Add to Reading List

Source URL: dos.mst.edu

Language: English - Date: 2015-06-04 06:31:10
UPDATE