Security analysis

Results: 6956



#Item
261Computer security / Attack

Detecting, Analyzing and Responding to Security Incidents: A Qualitative Analysis Rodrigo Werlinger, David Botta, Konstantin Beznosov University of British Columbia, Vancouver, Canada {rodrigow,

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
262Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
263Ubiquitous computing / ISO standards / Smart cards / Access control / Computer access control / Contactless smart card / FIPS 201 / Card reader / Biometric passport / Proximity card / Radio-frequency identification / ISO/IEC 14443

Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger IBM Research Division, Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 07:57:52
264SAP SE / OpenTravel Alliance / Societates Europaeae / Computer security / Vulnerability / SAP Business Suite / Draft:ERP Security / SAP implementation

SAP SYSTEMS ANALYSIS Business Risk Illustration Key Trends in Business Critical Application Security Virtually every SAP application is vulnerable to financial fraud, sabotage or espionage

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-04 10:44:21
265Vice Presidency of the United States / Twenty-fifth Amendment to the United States Constitution / Presidential Succession Act / Vice President of the United States / Presidency / Order of succession / President of the United States / President of the Senate / Speaker of the United States House of Representatives / United States Secretary of Homeland Security / United States federal executive departments / Electoral College

Presidential Succession: Perspectives, Contemporary Analysis, and 110th Congress Proposed Legislation

Add to Reading List

Source URL: www.law.umaryland.edu

Language: English - Date: 2009-02-23 16:05:24
266European migrant crisis / EU Navfor Med / Frontex / Common Security and Defence Policy / Military of the European Union / European Border and Coast Guard / Western European Union / European Union / Common Foreign and Security Policy / High Representative of the Union for Foreign Affairs and Security Policy / Political and Security Committee / Area of freedom /  security and justice

INTERNATIONAL POLICY ANALYSIS New Thrust for the CSDP from the Refugee and Migrant Crisis STEVEN BLOCKMANS

Add to Reading List

Source URL: library.fes.de

Language: English - Date: 2016-07-21 05:07:00
267Network management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile / Log management / Log analysis / Information technology security audit

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: log-management.it

Language: English - Date: 2014-05-07 13:40:47
268Radioactive waste / Nuclear technology / Nuclear reprocessing / PUREX / Sellafield / Thermal Oxide Reprocessing Plant / Nuclear power / Nuclear fuel cycle / Nuclear safety and security / Fault tree analysis / Nuclear fuel / Spent fuel pool

Paper 7_Renze Wang_41_2.hwp

Add to Reading List

Source URL: jrpr.org

Language: English - Date: 2016-07-25 00:18:34
269Network protocols / Internet protocols / Internet Standards / IP multicast / Multicast / Tor / Overlay multicast / Mechanistic target of rapamycin / Traffic analysis / Internet Relay Chat / Reliability / Email

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
270Payment systems / Debt / Cash flow / Corporate finance / Factoring / Fundamental analysis / Credit card / Asset-backed security / Debits and credits / Securitization / Accounts receivable / Bank

For personal use only A BETTER WAY TO PAY 1H 2016 RESULTS PRESENTATION / 29 FEBRUARYTM

Add to Reading List

Source URL: zipmoneylimited.com.au

Language: English - Date: 2016-02-29 19:23:49
UPDATE