Security analysis

Results: 6956



#Item
371

Security Analysis of a Cryptographically-Enabled RFID Device Stephen C. Bono∗ Matthew Green∗

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-09-24 18:48:01
    372Genetic engineering / Energy crops / Crops / Soy products / Molecular biology / Genetically modified crops / Soybean / Genetically modified soybean / Food security / Maize / Genetically modified organism / Cotton

    Microsoft Word - EU Non-GM Market Analysis FINAL.doc

    Add to Reading List

    Source URL: www.pgeconomics.co.uk

    Language: English - Date: 2010-07-28 10:33:18
    373

    Strategic Philanthropy for Cyber Security: An extended cost-benefit analysis framework to study cybersecurity Yiseul Cho Working Paper CISL# June 2012

    Add to Reading List

    Source URL: ic3.mit.edu

    Language: English - Date: 2015-03-02 04:16:01
      374Economy / Risk / Safety / Actuarial science / Auditing / Risk management / Risk analysis / Security / Internal audit / Risk assessment / Insurance / Emergency management

      Microsoft Word - Risk Management PolicyRev USE.doc

      Add to Reading List

      Source URL: plan.abag.ca.gov

      Language: English - Date: 2013-03-19 19:27:07
      375Military units and formations of NATO / Joint Analysis and Lessons Learned Centre / Military of Portugal / International Security Assistance Force / Allied Command Transformation / NATO / Supreme Headquarters Allied Powers Europe / Joint Task Force / War in Afghanistan / NATO CIS School / Structure of NATO

      JOINT ANALYSIS AND LESSONS LEARNED CENTRE LISBON, PORTUGAL Volume 2, Issue 5

      Add to Reading List

      Source URL: www.jallc.nato.int

      Language: English - Date: 2015-10-02 10:24:38
      376Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

      A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

      Add to Reading List

      Source URL: cisr.nps.edu

      Language: English - Date: 2008-08-18 13:41:06
      377Computing / Software / System software / Computer systems / Network management / Security / Log analysis / Login / Windows Security Log / Event Viewer / Password / Logfile

      Critical Log Review Checklist for Security Incidents

      Add to Reading List

      Source URL: www.securitywarriorconsulting.com

      Language: English - Date: 2010-03-23 02:04:48
      378Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

      JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

      Add to Reading List

      Source URL: www.cs.umd.edu

      Language: English - Date: 2014-03-28 12:39:15
      379

      3RG SPECIAL REPORT Crisis Mapping in Switzerland: A Stakeholder Analysis Zurich, February 2013 Risk and Resilience Research Group

      Add to Reading List

      Source URL: www.security-finder.ch

      Language: English - Date: 2014-04-28 09:29:40
        380Computer security / Security / Global Information Assurance Certification / Computing / SANS Institute / Malware analysis / Computer security incident management / Malware / Computer forensics / Professional certification

        The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

        Add to Reading List

        Source URL: www.sans.edu

        Language: English - Date: 2015-08-20 16:00:38
        UPDATE