Security analysis

Results: 6956



#Item
141Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
142Risk / Safety / Prevention / Actuarial science / Technology assessment / Security / Management / Risk management / Environmental impact assessment / Introduced species / Pest Risk Analysis

Module 3 PREVENTION October 2005

Add to Reading List

Source URL: www.issg.org

Language: English - Date: 2011-10-06 05:33:43
143Biology / Risk / Actuarial science / Probability / Project management / Security / Risk management / Introduced species / Aquaculture / Invasive species / Prevention / Pest Risk Analysis

The Management of Invasive Species in Marine & Coastal Environments Module 3 Prevention

Add to Reading List

Source URL: www.issg.org

Language: English - Date: 2011-10-06 03:25:36
144Computing / Mass surveillance / National Security Agency / United States government secrecy / Common Education Data Standards

PUBLIC COMMENTS ANALYSIS NoNames Combined.xlsx

Add to Reading List

Source URL: ceds.ed.gov

Language: English - Date: 2016-07-28 13:26:00
145Safety / Safety engineering / Occupational safety and health / Industrial hygiene / Economy / Chemical safety / Environmental social science / Hazard / Laboratory / Safety data sheet / Inherent safety / Process Hazard Analysis

Safety and Security Training for the Chemical Industry

Add to Reading List

Source URL: www.csp-state.net

Language: English - Date: 2014-07-21 16:50:22
146Domain name system / Internet / Computing / Network architecture / Root name server / Name server / Domain name / DNS hosting service / Domain Name System Security Extensions / DNS zone

DNS data collection and analysis Kazunori Fujiwara, JPRS <> Copyright © 2015 Japan Registry Services Co., Ltd.

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-30 06:39:46
147Information technology management / Prevention / Information technology / Security / Risk / Data security / IT risk management / Risk analysis / IT risk / ISO 31000 / ISO/IEC 27000-series / ISO/IEC 20000

Neue Subnorm ISOfür Risikomanagement

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:36
148Economy / Economics / Economic development / Social programs / Welfare economics / Poverty / Microfinance / Extreme poverty / Conditional cash transfer / Food security / Welfare / Targeting

COMPARATIVE COST-BENEFIT ANALYSIS OF PROGRAMS FOR THE ULTRA-POOR IN BANGLADESH MUNSHI SULAIMAN, RESEARCH DIRECTOR, BRAC INTERNATIONAL FARZANA MISHA, INTERNATIONAL INSTITUTE OF SOCIAL STUDIES, ERASMUS UNIVERSITY ROTTERDA

Add to Reading List

Source URL: www.copenhagenconsensus.com

Language: English - Date: 2016-08-14 22:58:22
149Malware / Computing / Computer network security / Multi-agent systems / Spamming / Cyberwarfare / Computer security / Malware analysis / Botnet

Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: countermeasure2012.com

Language: English - Date: 2012-11-01 08:16:33
150Cyberwarfare / Computer security / Computing / Malware / Computer network security / Multi-agent systems / Spamming / Malware analysis / Antivirus software / Computer virus / Rootkit / Botnet

Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:17:19
UPDATE