Security University

Results: 12075



#Item
481Software engineering / Software / Quality management / Software testing / Software review / Quality assurance / Hacking / Vulnerability / Code review / Coverity / Static program analysis / FindBugs

Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security Hala Assal∗, Jeff Wilson, Sonia Chiasson, and Robert Biddle School of Computer Science Carleton University Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:45
482Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / San Jose State University / Computer security

DOCX Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:39
483Computing / Software / System software / Cloud infrastructure / Microservices / VM / Hyper-V / Cloud computing / Network function virtualization / Application firewall / OpenStack / Web application firewall

Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email: Susanta Nanda

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2016-06-29 21:39:36
484Water / Desalination / Filters / Fresh water / Water desalination / Water supply / Sydney Desalination Plant / Water security

Title page Title: Desalination and the commons: tragedy or triumph? Author: David Zetland Address: Assistant Professor, Leiden University College, The Netherlands

Add to Reading List

Source URL: www.kysq.org

Language: English - Date: 2016-06-23 09:02:49
485Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
486Microsoft / Software / Computing / Email / End user / Outlook.com / Internet privacy / Dialog box

Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Department of Computer Science University of Pittsburgh

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:53:14
487Security / Cyberwarfare / Prevention / Technology / Cybercrime / National security / Norbert Pohlmann / E-commerce / Emerging technologies / Internet / Computer security / Privacy

Welcome to ISSE / OID 2015 Norbert Pohlmann Chairman: IT security association TeleTrusT Professor: Westphalian University of Applied Sciences Director:

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-26 09:39:11
488

AG Bildung: Bildungswege im Bereich „Food & Human Safety“, StandU BN= Universität Bonn, HS BRS= Hochschule Bonn-Rhein-Sieg, UNU-EHS = UN University, Institute for Environment & Human Security, BAEN = Bo

Add to Reading List

Source URL: www.bonnrealis.de

Language: German - Date: 2014-01-07 04:44:57
    489Physical geography / Politics of Europe / Extreme points of Earth / CanadaRussia relations / CanadaUnited States relations / RussiaUnited States relations / Domain Awareness Center / Politics of Russia / Homeland Security Centers of Excellence / Arctic Council / Arctic / Technology readiness level

    Arctic Domain Awareness Center (ADAC) A DHS Center of Excellence Hosted by the University of Alaska Year 1 Annual Report Period of Performance: – Helena S. Wisniewski. PhD

    Add to Reading List

    Source URL: adac.uaa.alaska.edu

    Language: English - Date: 2016-04-21 01:14:25
    490Demography / Human geography / International relations / Population / Constructivism / International relations theory / Security studies / Securitization / Human migration / Immigration / Copenhagen School / Asylum seeker

    LONDON’S GLOBAL UNIVERSITY UCL Migration Research Unit This paper may be downloaded for personal research purposes. However any additional reproduction for other purposes, in hard copy or electronically,

    Add to Reading List

    Source URL: www.geog.ucl.ac.uk

    Language: English - Date: 2014-07-17 05:22:02
    UPDATE