Security University

Results: 12075



#Item
771Social programs / Welfare economics / Social security / Social systems / Welfare state / Welfare / Unemployment benefits / Social protection / Pension / Social insurance / Social work / Poverty

Social work & the changing welfare system in Kazakhstan Sofia An, Nazarbayev University, Department of Sociology and Anthropology ICSW Europe workshop, Tbilisi, Georgia

Add to Reading List

Source URL: www.icsw.org

Language: English - Date: 2015-11-23 14:02:53
772Elections / Electronic voting / Human rights / Election technology / Voting system / Computer security / Privacy / Voting / Instant messaging / Electronic voting by country

Bilkent University Department of Computer Engineering Senior Design Project Smart-Vote: Electronic Voting System for Smartphones

Add to Reading List

Source URL: ivoteturkey.eu.pn

Language: English - Date: 2014-05-14 18:13:03
773University of Alabama at Birmingham / Clery Act / Campus police / Murder of Jeanne Clery / Residence life

THE UNIVERSITY OF ALABAMA AT BIRMINGHAM 2015 ANNUAL SECURITY AND FIRE SAFETY REPORT

Add to Reading List

Source URL: www.uab.edu

Language: English - Date: 2015-09-14 16:19:06
774Analysis of algorithms / Cache / Oblivious ram / Digital signature

2015 IEEE Symposium on Security and Privacy Privacy and Access Control for Outsourced Personal Records Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schr¨oder Saarland University & CISPA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:16
775Landlordtenant law / Real property law / Renting / Real estate / Property law / Leasehold estate / Lease / Eviction / Security deposit / Fixture / Key money / Landlord harassment

CAMPUS VILLAGE HOUSINGLEASE AGREEMENT – TERMS and CONDITIONS UNIVERSITY OF CALIFORNIA, IRVINE These Terms and Conditions are, by reference, incorporated into the lease document for Campus Village residents

Add to Reading List

Source URL: www.housing.uci.edu

Language: English - Date: 2016-07-27 19:17:54
776Computer network security / Multi-agent systems / Spamming / Botnets / Cyberwarfare / Command and control / Denial-of-service attack / ZeroAccess botnet / Communications protocol / NetFlow / Kelihos botnet / Transmission Control Protocol

CoCoSpot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis1 Christian J. Dietricha,c , Christian Rossowa,b , Norbert Pohlmanna a Institute for Internet Security, University of Applie

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:15
777Cryptography / Block cipher modes of operation / Ciphertext stealing / Initialization vector / Ciphertext indistinguishability / Advantage / Semantic security / Encryption / Disk encryption theory / Probabilistic encryption

The Security of Ciphertext Stealing Phillip Rogaway1 , Mark Wooding2 , and Haibin Zhang1 1 Dept. of Computer Science, University of California, Davis, USA 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2012-05-16 03:26:41
778Credit rating agencies / Credit / Health Insurance Portability and Accountability Act / Equifax / Experian / TransUnion / Computer security

Legal  Notice   E.A  Conway  Medical  Center,  part  of  the  University  Health  System,  experienced  a  computer  security   breach  on  Tuesday,  June  17,

Add to Reading List

Source URL: www.uhsystem.com

Language: English
779Actuarial science / Security / Risk / Management / Project management / Risk management / Risk analysis / Old Dominion University

The "Criteria for Performance Excellence“; An Intelligent Risk Approach September 2013 A category by category discussion of risks that are mitigated when an organization uses "the Criteria" for self-assessment, strateg

Add to Reading List

Source URL: spqa-va.org

Language: English - Date: 2013-10-19 21:21:06
780Cyberwarfare / Computer network security / Spamming / Cybercrime / Multi-agent systems / Ransomware / Computer security / Malware / Denial-of-service attack / Botnet / Search warrant / Phishing

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: www.privacyink.org

Language: English - Date: 2015-10-13 22:14:45
UPDATE