Security University

Results: 12075



#Item
611Microsoft / V-12 Navy College Training Program / Geography of Georgia U.S. state) / Security / National Register of Historic Places in Tift County /  Georgia / University of Georgia / Internet forum / Internet privacy / Georgia / Password / Privacy / Outlook.com

PDF Document

Add to Reading List

Source URL: www.walkgeorgia.org

Language: English - Date: 2016-02-26 15:38:28
612Security / Prevention / Safety / Cyberwarfare / Cybercrime / National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Risk management / Phil Agcaoili / Phil Reitinger

UNIVERSITY OF CALIFORNIA, ACADEMIC SENATE BERKELEY • DAVIS • IRVINE • LOS ANGELES • MERCED • RIVERSIDE • SAN DIEGO • SAN FRANCISCO J. Daniel Hare Telephone: (

Add to Reading List

Source URL: senate.universityofcalifornia.edu

Language: English - Date: 2016-06-02 11:04:16
613Hacking / White hat / English-language films

On the use of security and privacy technology as a plot device Joan Feigenbaum and Brad Rosen Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, brad.rosen}@yale.edu

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2015-08-24 20:43:01
614Email / Security / Diplomatic correspondence / Hillary Clinton email controversy / News leaks / Computing / WikiLeaks / Cyberspace

DOUGLAS COX City University of New York School of Law / / @docexblog LEGAL EMPLOYMENT CITY UNIVERSITY OF NEW YORK SCHOOL OF LAW Associate Law Library Professor

Add to Reading List

Source URL: www.law.cuny.edu

Language: English - Date: 2015-09-10 15:18:51
615Computing / Network protocols / Computer network security / Computer networking / Network architecture / Networking hardware / Software-defined networking / OpenFlow / Router / Packet processing / Routing / Virtual LAN

Merlin: A Language for Provisioning Network Resources Robert Soulé* Shrutarshi Basu† Parisa Jalili Marandi* Fernando Pedone* Robert Kleinberg† Emin Gün Sirer† Nate Foster† * University of Lugano † Cornell Uni

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:52
616Cameras / Pantiltzoom camera / Security engineering / Video

A Flexible Object Tracking System for Planary Motion Qinghai Liao, Wencong Zhang, Peng Shi, Ming Liu Department of Mechanical and Biomedical Engineering City University of Hong Kong Email: [m

Add to Reading List

Source URL: ram-lab.com

Language: English - Date: 2016-06-13 01:08:03
617Software / User interface techniques / Computer access control / Humancomputer interaction / Computing / Password / Security / The Button / Form / Login / Button / Double-click

SOKOINE UNIVERSITY OF AGRICULTURE GUIDE FOR ONLINE APPLICATION The guide assume that you have scanned copies of bank pay slip for the application fees, scanned copy of academic certificates required in jpg or pdf file f

Add to Reading List

Source URL: www.suanet.ac.tz

Language: English - Date: 2016-07-19 06:49:23
618J-1 visa / Email / Sevis / Utah / United States / United States Department of Homeland Security / Student exchange / Government / I-20

J-1 Transfer-In Form Please provide the following information in order for International Student & Scholar Services at the University of Utah to complete your transfer process from your current J sponsor to our universit

Add to Reading List

Source URL: internationalcenter.utah.edu

Language: English - Date: 2016-02-04 13:41:08
619Security / Computing / Auditing / Human resource management / Information systems / Department for Business /  Innovation and Skills / Higher Education Statistics Agency / Higher education in the United Kingdom / Internal audit / Data quality / Audit / Human resource management system

-16 - HR Data Quality Policy Owner: Anne Harkness: Head of HR Operations The University has a data policy to ensure the quality of data that it produces to meet internal and external needs. It needs to

Add to Reading List

Source URL: www.admin.ox.ac.uk

Language: English - Date: 2016-03-15 07:53:57
620Cryptography / Formal methods / Theoretical computer science / Computing / Computer security / Logic in computer science / Public key infrastructure / Formal verification / Correctness / Proof-carrying code / Authentication / Code signing

Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-01-27 19:53:39
UPDATE