Security University

Results: 12075



#Item
741Payment systems / Informal value transfer systems / Hawala / Remittances / Terrorism / Terrorism financing / Money laundering / Money transfer / Financial Action Task Force on Money Laundering / Al-Qaeda / Hundi / Terrorist front organization

Global Security Studies, Winter 2011, Volume 2, Issue 1 The Hawala System David C. Faith Diplomacy Department Norwich University

Add to Reading List

Source URL: globalsecuritystudies.com

Language: English - Date: 2011-06-02 16:45:15
742Immigration to the United States / United States Department of Labor / H-1B visa / Labor Condition Application / United States Department of Homeland Security / Form I-129 / Optional Practical Training / Permanent residence / United States Citizenship and Immigration Services / Visa policy of the United States / Labor certification / Form I-130

THE UNIVERSITY OF TENNESSEE (KNOXVILLE AREA) INSTRUCTIONS FOR REQUESTING AN H-1B PETITION AND CHECKLISTS OF ITEMS NEEDED (Updated AprilIMPORTANT: Contact CIE before starting H-1B request forms. Please do not

Add to Reading List

Source URL: international-utk-edu.wpengine.netdna-cdn.com

Language: English - Date: 2016-05-26 08:16:04
743Cyberwarfare / Malware / Rootkits / Cryptography / CrySyS Lab / Duqu / Stuxnet / Flame / Wiper / Computer security / Communications security / Ambient intelligence

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: crysys.hu

Language: English - Date: 2016-07-26 04:36:44
744Central processing unit / Microcode / Advanced Micro Devices / X86-64 / Instruction set / Superscalar processor / Microprocessor / Microarchitecture / X86 / Micro-operation / Firmware / Intel Core

Security Analysis of x86 Processor Microcode Daming D. Chen Gail-Joon Ahn Arizona State University

Add to Reading List

Source URL: www.dcddcc.com

Language: English - Date: 2016-08-05 04:38:17
745Mass surveillance / Privacy of telecommunications / National Security Agency / American law journals / Dismissal of United States Attorneys controversy / Michael Mukasey / National Security Law Journal / PRISM

VOLUME 3 ISSUE 2 SPRING/SUMMER 2015 National Security Law Journal George Mason University School of Law

Add to Reading List

Source URL: www.nslj.org

Language: English - Date: 2015-07-25 12:21:34
746Nancy Leveson / Leveson

EECS: Medical Device Security. Winter 2013 University of Michigan, Computer Science and Engineering http://www.eecs.umich.edu/courses/eecs598-008/ Instructor: Prof. Kevin Fu N.B.: Additional reading material appe

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2013-01-14 00:14:11
747Waste / Industrial ecology / Data security / Electronic waste / Computer recycling / Recycling / Extended producer responsibility / Municipal solid waste / Solving the E-waste Problem / Bioleaching / Chemical waste / Global waste trade

United Nations University Press is the publishing arm of the United ­Nations University. UNU Press publishes scholarly and policy-oriented books and periodicals on the issues facing the United Nations and its peoples an

Add to Reading List

Source URL: www.step-initiative.org

Language: English - Date: 2015-02-02 05:44:20
748Tax forms / Taxation in the United States / Student financial aid / Social programs / Form / University of California /  Santa Cruz / FAFSA / Tax return / Social Security / Employee benefit / Unemployment benefits

uc santa cruz FINANCIAL AID AND SCHOLARSHIP OFFICE UCSC Student’s ID /Account Number (Do not use CRUZ ID)

Add to Reading List

Source URL: financialaid.ucsc.edu

Language: English - Date: 2016-07-25 12:24:12
749Identity documents / Security / Crime prevention / Cryptography / National security / Internet privacy / Privacy / BlackBerry Priv / Password / Computer security / Identity theft / Privacy concerns with social networking services

End User Concern about Security and Privacy Threats Joshua B. Gross and Mary Beth Rosson College of Information Sciences and Technology311B IST Building The Pennsylvania State University 311B IST Building University Park

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
750Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
UPDATE