Security analysis

Results: 6956



#Item
361

Characteristics of Low-Income Households With Very Low Food Security: An Analysis of the USDA GPRA Food Security Indicator

Add to Reading List

Source URL: www.ers.usda.gov

Language: English - Date: 2012-01-09 10:09:31
    362

    Earth Observation and International Security: The Role of Uncertainty in Satellite Imagery Analysis by Non-State Actors Earth Observation and International Security: The Role of Uncertainty in Satellite Imagery Analysis

    Add to Reading List

    Source URL: www.espi.or.at

    Language: English - Date: 2015-09-18 05:22:12
      363

      Security Analysis of Smartphone Point-of-Sale Systems WesLee Frisby Benjamin Moench Benjamin Recht

      Add to Reading List

      Source URL: rist.tech.cornell.edu

      Language: English - Date: 2015-07-13 21:30:22
        364Compiler construction / Parsing / Formal languages / Lexical analysis / LR parser

        Finite State Machine Parsing for Internet Protocols: Faster Than You Think Robert David Graham Errata Security robert david

        Add to Reading List

        Source URL: www.cs.dartmouth.edu

        Language: English - Date: 2014-05-19 17:41:59
        365

        Control Worksheet The purpose of this document is to identify security and privacy control gaps. Spending some time with this analysis will help later when writing a security plan. Focus on controls as they apply to the

        Add to Reading List

        Source URL: ciso.washington.edu

        Language: English - Date: 2014-11-19 17:33:15
          366Government / United States government secrecy / Politics / Classified information / For Official Use Only / Freedom of information legislation / Anti-fascism / Gentrification / Anarchism / United States Department of Homeland Security

          UNCLASSIFIED//FOR OFFICIAL USE ONLY (U//FOUO) Self-identified Anarchist Extremists Target Urban “Gentrification” Sites with Arson 23 JulyU//FOUO) Prepared by the Office of Intelligence and Analysis (I&A), Hom

          Add to Reading List

          Source URL: info.publicintelligence.net

          Language: English - Date: 2014-01-16 23:23:27
          367Military / NATO / Military units and formations of NATO / Joint Analysis and Lessons Learned Centre / Military of Portugal / Allied Command Transformation / NATO School / Civil-military co-operation / International Security Assistance Force / Staff / Structure of NATO / NATO CIS School

          JOINT ANALYSIS AND LESSONS LEARNED CENTRE LISBON, PORTUGAL Volume 3 Issue 1 January 2012

          Add to Reading List

          Source URL: www.jallc.nato.int

          Language: English - Date: 2015-10-02 10:24:44
          368

          Application Deadline: June 15, 2009 NINTH INTERNATIONAL SCHOOL ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN FOSAD 2009 http://www.sti.uniurb.it/events/fosad09 30 August – 4 September 2009, Bertinoro, Italy FOSAD has

          Add to Reading List

          Source URL: www.sti.uniurb.it

          Language: English - Date: 2009-02-03 07:05:30
            369Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

            SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

            Add to Reading List

            Source URL: www.di.fc.ul.pt

            Language: English - Date: 2013-01-18 09:24:08
            370

            Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, and Yiheng Li September 2004 CMU-ISRI

            Add to Reading List

            Source URL: reports-archive.adm.cs.cmu.edu

            Language: English - Date: 2004-09-15 17:07:20
              UPDATE