Security analysis

Results: 6956



#Item
151Information technology / Information technology management / Engineering / Method engineering / Management / Security / Systems engineering / Joint Capabilities Integration Development System / Analysis of Alternatives / Department of Defense Architecture Framework / Risk management / ITIL

Interoperability ClearingHouse Architecture Assurance Method (AAM) A consensus base process standard for enabling sound IT investment decisions Streamlined DoDand Clinger Cohen Act Compliance

Add to Reading List

Source URL: www.ichnet.org

Language: English - Date: 2011-09-13 11:23:10
152Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
153Economy / Labour law / Social programs / Social security / Unemployment benefits / Unemployment / Workforce Investment Act / Layoff

Microsoft Word - Research Analysis 2005 report.doc

Add to Reading List

Source URL: almis.labor.state.ak.us

Language: English - Date: 2010-02-16 14:12:00
154Engineering / Ethics / Academia / Chemical engineering / Commodity chemicals / Project management / Risk management / Security / Systems engineering / Hanford Site / Risk analysis / Environmental engineering

Microsoft WordCWP BIOGRAPHICAL SKETCH.doc

Add to Reading List

Source URL: www.cresp.org

Language: English - Date: 2015-10-30 11:11:07
155Law enforcement / Surveillance / Prevention / Security / Video surveillance / Crime prevention / Body worn video / Video content analysis / Closed-circuit television / Automatic number plate recognition

Microsoft Word - CCCWhitepaperonBodyCamerasinLawEnforcement v2 (1).docx

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 12:06:32
156Cyberwarfare / Computing / Security / Hacking / Computer network security / Malware / Server / Computer security / CSC Version 6.0 / Cyber-collection

THE PROJECTSAURON APT Global Research and Analysis Team VersionAugust 9, 2016) The ProjectSauron APT

Add to Reading List

Source URL: cdn.securelist.com

Language: English - Date: 2016-08-09 10:39:42
157Domain name system / Internet / Computing / Network architecture / DNS spoofing / Domain Name System Security Extensions / Name server / DNS zone / Pharming / Comparison of DNS server software / Google Public DNS

DNS Threat Analysis Mark Santcroos∗, Olaf M. Kolkman†NLnet Labs www.nlnetlabs.nl NLnet Labs document 2006-SE-01 version 1.0 ∗

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
158Computing / Computer security / Cyberwarfare / Spyware / Mobile Malware / Hummingbad / Android / Google Play / Malware / Rootkit

From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN For five months, Check Point mobile threat researchers had unprecedented, behind-thescenes access to a group of cyb

Add to Reading List

Source URL: blog.checkpoint.com

Language: English - Date: 2016-07-01 12:40:55
159Health / Health care / Personal life / Health economics / Social programs / Long-term care / Medical terminology / Health insurance / Right to health / Social security / Health system / National Health Service

MISSOC SECRETARIAT MISSOC ANALYSIS 2014 COST SHARING FOR HEALTH AND LONG-TERM CARE BENEFITS IN KIND October 2014

Add to Reading List

Source URL: www.missoc.org

Language: English - Date: 2016-04-18 12:30:54
160Climatology / Physical geography / Malnutrition / Earth / Climate change / Famines / Humanitarian aid / Climate history / Food security / Climate change adaptation / Climate / Global warming

Child malnutrition and climate in Sub-Saharan Africa: An analysis of recent trends in Kenya

Add to Reading List

Source URL: chg.geog.ucsb.edu

Language: English - Date: 2015-04-20 13:57:25
UPDATE