Security University

Results: 12075



#Item
621Security / Prevention / Computer security / Computer network security / Cryptography / Crime prevention / National security / Password / Spyware / Password manager / Password policy

Read this folder – for our safety Safeguard valuable knowledge At University of Copenhagen we procure and convey knowledge. Electronically, in writing and orally. Quite simply, that is our main activity and value at C

Add to Reading List

Source URL: informationssikkerhed.ku.dk

Language: English - Date: 2011-10-17 17:46:46
622Computing / Cryptography / Cryptographic protocols / Network architecture / IPsec / Encryption / Information Security Group / Data

Jean Paul Degabriele Information Security Group Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-04-07 15:14:14
623Microsoft Windows / Computer architecture / Windows XP / Windows Task Scheduler / Windows Vista / Features new to Windows XP

Robert W. Reeder and Roy A. Maxion Dependable Systems Lab, Computer Science Dept., Carnegie Mellon University Many security vulnerabilities are caused by user interfaces that induce people to make errors. What kinds of e

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:20
624New Mexico / United States Department of Energy national laboratories / Science and technology in the United States / Federally Funded Research and Development Centers / Livermore /  California / University of California / United States / Nuclear Threat Initiative / Nuclear proliferation / Lawrence Livermore National Laboratory / Sandia National Laboratories / University of New Mexico

National Security Colloquium

Add to Reading List

Source URL: nssp.unm.edu

Language: English - Date: 2016-03-29 22:15:48
625Cryptography / Integer factorization algorithms / Computational hardness assumptions / E-commerce / RSA / Quadratic sieve / Lattice / Integer factorization

Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint ∗ Alexander May, Maike Ritzenhofen Horst Görtz Institute for IT-security Faculty of Mathematics Ruhr-University of Bochum, 44780 Bochum, Ger

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2015-08-28 10:30:32
626Computing / Online databases / Security / University of Essex / Data / Data management / UK Data Archive / Secure communication / E-commerce / Data security / Computer security / High-performance Integrated Virtual Environment

ESRC Secure Data Service A new vision for secure data access Melanie Wright, Director Secure Data Service UK Data Archive

Add to Reading List

Source URL: www.scot-ship.ac.uk

Language: English - Date: 2014-04-01 08:14:46
627Actuarial science / Safety / Prevention / Public health / Risk / Financial risk / Probability / Maritime security / Security / LNU / Threat

Maritime security HANS LIWÅNG Swedish Defence University, @ Lnu August 2015

Add to Reading List

Source URL: www.vasco-da-gama.eu

Language: English - Date: 2015-09-04 04:57:38
628Behavior / Human sexuality / Human behavior / Rape / Sex crimes / Sexual abuse / Criminology / Gender studies / Sexual assault / Sexual misconduct / Sexual harassment / Laws regarding rape

A t the University of Nebraska Medical Center, the safety and security of our faculty, staff, students, volunteers, as well as patients and visitors, is always at the top of our agenda

Add to Reading List

Source URL: unmc.edu

Language: English - Date: 2016-05-20 09:20:08
629Disaster preparedness / Humanitarian aid / Infrastructure / United States Department of Homeland Security / Security / National Institute of Disaster Management / Disaster risk reduction / United Nations University / Emergency management / Critical infrastructure protection / Deutsche Gesellschaft fr Internationale Zusammenarbeit / Vulnerability assessment

Critical Infrastructures and Disaster Risk Reduction 46.cdr

Add to Reading List

Source URL: nidm.gov.in

Language: English - Date: 2013-10-24 06:24:52
630United States Department of Homeland Security / I-20 / University of California /  Davis / University of California / J-1 visa / Email / Student and Exchange Visitor Program

Request for I-20/DS-2019 – Continuing Students Processing Time: Ten (10) working days Do not fill out this form if you are a new student at UC Davis. This form is for current UC Davis students in F-1 or J-1 status only

Add to Reading List

Source URL: siss.ucdavis.edu

Language: English - Date: 2015-01-09 19:17:50
UPDATE