Security analysis

Results: 6956



#Item
121Risk / Prevention / Safety / Probability / Vulnerability / Hazard analysis / Security / Actuarial science / Social vulnerability / Hazard / Natural hazard / Landslide

nhessF03a_BUWAL.ai

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2011-11-10 04:24:49
122Engineering / Evaluation / Pharmaceutical industry / Validity / Software quality / Quality / Reliability engineering / Survival analysis / Systems engineering / Computer security / Verification and validation / Validation

International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

Add to Reading List

Source URL: conferences.ncl.ac.uk

Language: English - Date: 2016-03-07 04:22:54
123Economy / Finance / Money / Actuarial science / Security / Project management / Derivative / Risk / IT risk / Investment fund / Costbenefit analysis

JCMarch 2016 Final draft regulatory technical standards with regard to presentation, content, review and provision of the

Add to Reading List

Source URL: eiopa.europa.eu

Language: English - Date: 2016-04-07 03:52:35
124Systems engineering / Military acquisition / Economy / Business / Government / Project management / Supply chain management / Government procurement in the United States / United States administrative law / Information Services Procurement Library / Analysis of Alternatives / United States Department of Homeland Security

Investment Management Handbook

Add to Reading List

Source URL: www.it-aac.org

Language: English - Date: 2015-06-22 12:07:28
125Economy / Finance / Money / Investment banks / Primary dealers / Financial markets / Financial services / Close Brothers Group / Securities research / Security analysis / Leifheit / Volatility

Leifheit AG Recommendation: Risk: Price Target:

Add to Reading List

Source URL: ir.leifheit-group.com

Language: English - Date: 2014-08-28 10:25:59
126Risk / Actuarial science / Project management / Prevention / Risk management / Security / Risk analysis / Safety / ISO 31000 / Quality management / Enterprise risk management / IT risk management

A risk-based approach to management From Eduard Pfister www.parm.com

Add to Reading List

Source URL: www.parm.com

Language: English - Date: 2013-11-11 03:01:29
127Computing / Software / Cryptography / Pseudorandom number generators / Computing platforms / Cross-platform software / Random number generation / Cryptographic software / /dev/random / Key generation / Entropy / Java

Motivations PRNG Security Model Java SecureRandom Analysis

Add to Reading List

Source URL: www-fourier.ujf-grenoble.fr

Language: English - Date: 2014-03-31 06:15:11
128Software / Computing / System software / Message transfer agents / Email / Simple Mail Transfer Protocol / Sendmail / OpenSSH / Email forwarding / Post Office Protocol

WB-Analysis of the Nakula & Antareja Incident A WB-Analysis of a system security-related incident 5.5th Bieleschweig Workshop Bielefeld, June

Add to Reading List

Source URL: www.rvs.uni-bielefeld.de

Language: English - Date: 2005-06-15 07:43:48
129Cyberwarfare / Computer virus / Deception / Internet security / AIDS / Antivirus software / Comparison of computer viruses / Abraxas

VIRUS BULLETIN MARCH … VIRUS ANALYSIS 2 Olympic Games Mikko Hypponen

Add to Reading List

Source URL: www.virusbulletin.com

Language: English - Date: 2016-08-02 05:30:54
130Cybercrime / Security / Technology / Prevention / Computer network security / Identity documents / Phishing / Social engineering / Spamming / Mobile security / Computer security / Mobile app

Analysis of Euro 2016 impact on mobile security and usage June 2016 SMARTWIRE LABS

Add to Reading List

Source URL: wandera.com

Language: English - Date: 2016-06-28 09:49:53
UPDATE