Security analysis

Results: 6956



#Item
221Domain name system / Cyberwarfare / Malware / Computer network security / Internet protocols / Malware analysis / Botnet / OpenDNS / Name server / Denial-of-service attack / Root name server / Payload

Sandnet: Network Traffic Analysis of Malicious Software Christian Rossow1,2 , Christian J. Dietrich1,3 , Herbert Bos2 , Lorenzo Cavallaro2 , Maarten van Steen2 , Felix C. Freiling3 , Norbert Pohlmann1 1 Institute for In

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-21 09:55:27
222Environmental management / Impact assessment / Philosophy of science / Data security / Public administration / Environmental impact assessment / Information security / Evidence-based policy / Welsh language / Regulatory Impact Analysis

Reducing Complexity and Adding Value: A Strategic Approach to Impact Assessment in the Welsh Government February 2016

Add to Reading List

Source URL: ppiw.org.uk

Language: English - Date: 2016-05-03 03:49:01
223Computer network security / E-commerce / Secure communication / Malware / OpenSSL / Password / Computer security / Ver / Microsoft Windows

Public document APT1: technical backstage malware analysis

Add to Reading List

Source URL: malware.lu

Language: English - Date: 2015-06-18 15:20:55
224Computer security / Computer network security / E-commerce / Cybercrime / EMC Corporation / RSA Security / Information security operations center / Security information and event management / Threat / RSA / Phishing / Draft:Threat Intelligence Analyst

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32
225IBM software / Software testing / Security AppScan / Rational Software / IBM / Rational Unified Process / Software development / Dynamic program analysis / IBM R&D Labs in Israel

Microsoft PowerPoint - AS14.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:40
226Welfare economics / Employment compensation / Social programs / Income distribution / Labour economics / Guaranteed minimum income / Social protection / Social security / Unemployment benefits / Social exclusion / Minimum wage / Poverty

MISSOC SECRETARIAT MISSOC ANALYSIS 2011 GUARANTEED MINIMUM RESOURCES For the European Commission

Add to Reading List

Source URL: www.missoc.org

Language: English - Date: 2016-04-18 12:30:34
227Cyberwarfare / Cybercrime / National security / E-commerce / Computer network security / Computer security / United States Computer Emergency Readiness Team / SCADA / Cyber-attack / ISAC

TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2016-03-22 09:34:19
228Immigration to the United States / Illegal immigration to the United States / Immigration law / We Belong Together / Secure Communities and administrative immigration policies / Illegal immigration / DREAM Act / Immigration detention / Deferred Action for Childhood Arrivals / United States Department of Homeland Security / Border Security /  Economic Opportunity /  and Immigration Modernization Act

Analysis of Executive Action on Immigration and Priorities for Women November 24, 2014 On November 20, 2014 President Obama took an historic step toward fixing our broken immigration system by announcing several executiv

Add to Reading List

Source URL: www.webelongtogether.org

Language: English - Date: 2014-12-04 14:59:37
229United Nations Development Group / Food politics / Famines / Food security / Urban agriculture / Ecuador / Food and Agriculture Organization / Quito / World Food Programme / Poverty / Food

3.2. Launch of project “Improved Mapping and Spatial Analysis of Food Security and Poverty in Ecuador” Objectives

Add to Reading List

Source URL: gisweb.ciat.cgiar.org

Language: English - Date: 2003-10-06 09:36:10
230Smart cards / Java platform / Cross-platform software / Java Card / Applet / Java / Subscriber identity module / Computer security / MULTOS / Application programming interface / Java applet / Java virtual machine

Smart card security from a programming language and static analysis perspective Xavier Leroy INRIA Rocquencourt

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2003-04-08 07:22:13
UPDATE