Security analysis

Results: 6956



#Item
311Economy / Finance / Money / Banking / Fixed income analysis / Stock market / Futures contract / UBS / Probability of default / Security / Yield / Bond

PresXpress Portrait Presentation

Add to Reading List

Source URL: investments-au.ubs.com

Language: English - Date: 2016-06-17 00:29:15
312

Cruel Intentions: A Security Analysis of Web Intents Jenna Kallaher, Amal Krishnan, Paul Makowski, Eric Chen, Collin Jackson Carnegie Mellon University {jkallahe, achemman, pmakowsk}andrew.cmu.edu, {eric.chen, collin.jac

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
    313Regional Studies Association / Regional science / RSA Security / Royal Society of Arts / RSA / Academia / Ambassador / United Kingdom / Government

    Regional Studies Association RSA Ambassador Guidelines Rationale The Regional Studies Association is a leading and impactful community at the forefront of policy debates and the analysis of regional issues. The Associati

    Add to Reading List

    Source URL: www.regionalstudies.org

    Language: English - Date: 2015-12-21 06:19:28
    314Malware / Computer network security / Antivirus software / Computer virus / Intrusion detection system / Avira / Malware analysis / Malware research

    SyScan’14, April 2–4, 2014, Singapore, Singapore Embracing the new threat: towards automatically, self-diversifying malware Mathias Payer

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    315Actuarial science / Risk / Academia / Prevention / Financial risk / Risk analysis / Security / Systems engineering / Risk management / Finance / Economic model / Value at risk

    RISK MANAGEMENT LEVEL: GradesThis lesson builds conceptual understanding, scientific investigation and practical reasoning while developing and using reading, writing, and mathematics.

    Add to Reading List

    Source URL: www.niehs.nih.gov

    Language: English - Date: 2016-06-16 19:47:18
    316Malware / Malware analysis / Cyberwarfare / Computer viruses / Carding / Computer security

    Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

    Add to Reading List

    Source URL: maecproject.github.io

    Language: English - Date: 2016-06-15 18:10:07
    317Fixed income analysis / Bond / Coupon / HSBC Bank / Mortgage-backed security / Structured finance / HSBC / Zero-coupon bond / Derivative / Repurchase agreement / Reverse convertible securities / Bond valuation

    Microsoft Word - HSBC_MorningstarS1__17June2011_FINAL.doc

    Add to Reading List

    Source URL: www.hsbcnet.co.uk

    Language: English - Date: 2011-10-06 05:22:50
    318Economy / Profit / Fundamental analysis / Management accounting / Net income / Income / Earnings before interest /  taxes /  depreciation /  and amortization / Earnings before interest and taxes / Gross profit / Social Security / BlackBerry Limited / Credit card

    Draft 16/Preliminary Prospectus

    Add to Reading List

    Source URL: idwatchdog.com

    Language: English - Date: 2015-11-24 14:25:56
    319

    SOURCE CODE ANALYSIS TOOLBOX FOR SOFTWARE SECURITY ASSURANCE VeriFast

    Add to Reading List

    Source URL: www.stance-project.eu

    Language: English - Date: 2016-04-20 09:48:02
      320

      Out-of-Box Exploitation A Security Analysis of OEM Updaters Darren Kemp Chris Czub Mikhail Davidov

      Add to Reading List

      Source URL: duo.com

      Language: English - Date: 2016-05-31 15:25:36
        UPDATE