Security analysis

Results: 6956



#Item
241Immigration to the United States / Illegal immigration to the United States / Immigration law / Donald Trump / The Apprentice / WWE Hall of Fame / Immigration reform / Illegal immigration / U.S. Immigration and Customs Enforcement / United States Border Patrol / United States Department of Homeland Security / Secure Communities and administrative immigration policies

THE $900 BILLION QUESTION: HOW TO ADDRESS ILLEGAL IMMIGRATION IN AMERICA A Complete Fiscal Analysis Of Donald J. Trump’s Immigration Reform Plan By Mark McIntosh & Steven Bogden

Add to Reading List

Source URL: www.p2016.org

Language: English - Date: 2016-01-11 10:58:57
242Network management / System administration / Crime prevention / National security / Secure communication / Logfile / Login / Syslog / Computer security / Security information and event management / Log analysis / Windows Security Log

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:43:06
243Computer worms / Computer network security / Warhol worm / SQL Slammer / Computer security / Antibody

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
244Software testing / Program analysis / Software review / Concurrent programming languages / Cross-platform software / Static program analysis / Dynamic program analysis / Programming tool / Lint / Application security / Software quality / Java

http://www.stickyminds.com/BetterSoftware/magazine.asp?fn=cifea

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-06-20 15:01:26
245Software testing / Extreme programming / Continuous integration / Vulnerability / Regression testing / Code coverage / Software quality / Unit testing / Dynamic program analysis

Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Security vulnerabilities are cau

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-07-20 16:45:50
246Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
247Risk / Vulnerability / Actuarial science / Hazard analysis / Security / Social vulnerability / Hazard / Vulnerability assessment / Vulnerability index / Intergovernmental Panel on Climate Change / Natural hazard / Disaster risk reduction

Journal of Environmental Management123e132 Contents lists available at ScienceDirect Journal of Environmental Management journal homepage: www.elsevier.com/locate/jenvman

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2016-03-05 11:42:04
248Scientific method / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Database / Data analysis / Data sharing

Youth Chances Additional File 4 Page 1 Youth Chances Data Sharing Policy Information for researchers interested in analysing Youth Chances data: How to access and use Youth Chances data

Add to Reading List

Source URL: www.youthchances.org

Language: English - Date: 2013-11-19 06:44:55
249Security / Computer security / Data security / Impact assessment / Risk analysis / Privacy Impact Assessment / Risk management / Privacy / Internet privacy / IT risk / Risk assessment / Threat

Microsoft Word - EvotePosterPaperResubmit

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-31 10:35:58
250Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
UPDATE