Security analysis

Results: 6956



#Item
161Food and drink / Agriculture / Tropical agriculture / Agronomy / Food industry / Energy crops / Drinks / Food security / Rice / Nepal / Maize

Agricultural Inputs Sector in Nepal: Rapid Post Earthquake Market Analysis Emergency Context and the Importance of Markets On 25 April 2015, at 11:56 local time, a 7.8 magnitude earthquake struck Nepal with its epicentre

Add to Reading List

Source URL: www.samarth-nepal.com

Language: English - Date: 2015-06-10 04:24:41
162United States Department of Homeland Security / Government / United States intelligence agencies / National security / Safety / Infrastructure / Security engineering / Cyberwarfare / Critical infrastructure protection / United States Computer Emergency Readiness Team / DHS Office of Intelligence and Analysis / Risk management

Regional Overview of Critical Infrastructure Programs: Region Snapshots May 2016 i Introduction:

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-05-19 16:45:07
163Computer security / Software / Cyberwarfare / United States Department of Homeland Security / Infrastructure / National security / Antivirus software / Critical infrastructure protection / SCADA / Cyber-attack / Smart grid / Stuxnet

Summary Within the EU project CockpitCI “Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructure” and under the patronage of Étienne Schneider, Minister of Economy and Foreig

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2016-03-11 09:45:07
164Cyberwarfare / Computer network security / Security / Computer security / Cybercrime / Social engineering / E-commerce / Phishing / Threat / Targeted threat / Threat Intelligence Platform / Advanced persistent threat

T2 SPEAR PHISHING PROTECTION T2 Analysis & Mitigation Disrupt spear phishing attacks before systems and data are compromised. Spear phishing is the most prevalent and successful tactic used in advanced targeted attacks.

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-08-11 09:01:38
165Computer access control / Computer security / Identity management / Federated identity / Shibboleth / IDM / Security Assertion Markup Language / Authentication

Report Market Analysis of IdM Solutions for Swiss edu-ID Name Surname Job Title Document Type:

Add to Reading List

Source URL: projects.switch.ch

Language: English - Date: 2016-07-14 11:47:46
166Software / Computing / System software / Cloud computing / Database / Cloud database / Filesystem-level encryption / Cloud computing security / Distributed file system for cloud

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
167Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
168Software / Computing / Computer network security / Cloud clients / Portable software / Web browsers / Hypertext Transfer Protocol / Browser security / HTTP cookie / JavaScript / Google Chrome / Browser extension

Run-time Monitoring and Formal Analysis of Information Flows in Chromium Lujo Bauer Shaoying Cai? Limin Jia Timothy Passaro Michael Stroucken Carnegie Mellon University ? Institute for Infocomm Research

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
169Defense Technical Information Center / Military science / National security / Military / Tat people / Critical infrastructure protection / Battlespace / Bio / IAC / Data & Analysis Center for Software / Cyber Security and Information Systems Information Analysis Center

DoD Information Analysis Centers (IAC) Multiple Award Contract (MAC) Government-Industry Day 16 Jun 2016 Source Selection Authority: Air Force PEO/CM

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2016-06-16 12:19:51
170Software engineering / Software / Quality management / Software testing / Software review / Quality assurance / Hacking / Vulnerability / Code review / Coverity / Static program analysis / FindBugs

Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security Hala Assal∗, Jeff Wilson, Sonia Chiasson, and Robert Biddle School of Computer Science Carleton University Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:45
UPDATE