Security University

Results: 12075



#Item
571Welfare economics / Employee benefits / Health insurance / Retirement / Costbenefit analysis / Economy / Economics / Microeconomics / Social Security / Unemployment benefits

Johns Hopkins University 2013 Benefit Changes—Frequently Asked Questions This summary covers what we anticipate will be the most commonly asked questions about the recommended 2013 benefit changes. If you have a questi

Add to Reading List

Source URL: benefits.jhu.edu

Language: English - Date: 2012-02-03 15:02:59
572Statistical classification / Data / Information / Computing / Geographic data and information / Global Positioning System / Biometrics / Coding theory / Fuzzy extractor / Geotagging / Support vector machine / K-nearest neighbors algorithm

Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-23 18:24:49
573Software / System software / Computer security / Antivirus software / Avast Software / Computer virus / VirusTotal / UPX / F-Secure / Clam AntiVirus / Avira / Bitdefender

PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion Jon Oberheide, Michael Bailey, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 4810

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:58
574Energy / Hydraulic fracturing / Natural gas / Natural gas in the United States / Environmental impact of hydraulic fracturing / Economy / Energy policy of the United States / Natural environment / Fossil fuel / Oil sands / Energy Policy Act / Shale gas

COLUMBIA UNIVERSITY | SIPA School of International and Public Affairs S. 585 American Natural Gas Security and Consumer Protection Act MPA in Environmental Science and Policy

Add to Reading List

Source URL: mpaenvironment.ei.columbia.edu

Language: English - Date: 2016-04-06 14:20:35
575Security / Computer access control / Computing / Cryptography / Access control / Authentication / Authorization / SOAP / Kerberos

An authorization control framework to enable service composition across domains Takashi Suzuki University of California, Berkeley Berkeley, CA

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-02-14 23:42:26
576Climate change policy / Environmental policy / Climate change mitigation / Climate change / Value-added tax / Carbon leakage / American Clean Energy and Security Act / Carbon tax

University of Hawai`i at Mānoa Department of Economics Working Paper Series Saunders Hall 542, 2424 Maile Way, Honolulu, HIPhone: (

Add to Reading List

Source URL: www.economics.hawaii.edu

Language: English - Date: 2014-03-06 19:38:53
577Dependability / Quality / Safety / Safety engineering / Security / Computing / Value / Euthenics / Carlo Ghezzi / Mehdi Jazayeri

PAOLA INVERARDI 2012 OCCUPATION Paola Inverardi was born in L’Aquila on November 3rdShe received a Laurea degree summa cum laude in Computer Science at University of Pisa on FebruarySoon after she started

Add to Reading List

Source URL: www.di.univaq.it

Language: English - Date: 2012-11-15 04:09:10
578Security / Prevention / Hacking / Military technology / Computer security / Cybercrime / National security / University of Hawaii / Cyberwarfare in the United States / Michigan Cyber Range / DoD Cyber Crime Center

NEWS RELEASE May 23, 2016 Media Contact: Julie Funasaki Yuen, (

Add to Reading List

Source URL: laulima.hawaii.edu

Language: English
579Human resource management / Leave / Employment compensation / Economy / Labor / Employment / Health care / Sick leave / Social security / Accrual / Fayetteville /  Arkansas / Donation

UNIVERSITY OF ARKANSAS FAYETTEVILLE CATASTROPHIC LEAVE BANK PROGRAM DONATION OF SICK AND ANNUAL LEAVE PLEASE TYPE OR

Add to Reading List

Source URL: hr.uark.edu

Language: English - Date: 2016-08-16 16:30:13
580Computing / Computer security / Payment systems / Economy / Computer law / Information privacy / Payment Card Industry Data Security Standard / Penetration test / Software testing / CDE / Network segmentation / Credit card

PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-28 09:34:18
UPDATE