Security analysis

Results: 6956



#Item
491

An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan Wei Liu ∗

Add to Reading List

Source URL: weis2006.econinfosec.org

Language: English
    492Computer security / Malware / JavaScript / Threat / Change detection / Botnet / Computer network security / Computing / Cyberwarfare

    Poster: Web Change Analysis Approach for Malicious Website Detection SangYong Choi HoMook Cho

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:22
    493Remote sensing / Earth / Geography / Environment / Food politics / Agriculture / Food security

    Global Food Security-support Analysis Data @ 30 m (GFSAD30) Project The GFSAD30 project we will Release Cropland Products as: Global Cropland Extent (GCE) ‘GCE’ (Global Cropland Extent) Product / Documentation Review

    Add to Reading List

    Source URL: e4ftl01.cr.usgs.gov

    Language: English
    494Digital photography / Agriculture / Pixel / Imaging / Technology / Remote sensing / Normalized Difference Vegetation Index / Computer graphics

    Frequently Asked Questions (FAQ) What are GCE 1km Crop Dominance (aka GCE V0.0) product and GCE 1km Multi-study Crop Mask (aka GCE V1.0) products? Global Food Security-support Analysis Data @ 30 m (GFSAD30) will be produ

    Add to Reading List

    Source URL: e4ftl01.cr.usgs.gov

    Language: English
    495Crime / Crime prevention / National security / Police / Surveillance / Crime mapping / Crime analysis / Mediation / Cincinnati Police Department / Law enforcement / Law / Criminology

    Master settlement agreement

    Add to Reading List

    Source URL: www.acluohio.org

    Language: English - Date: 2011-11-18 13:00:25
    496Internet privacy / Information security / Information privacy / Personally identifiable information / Consumer privacy / Health Insurance Portability and Accountability Act / Spyware / Risk / Freedom of speech / Ethics / Privacy / Security

    Spare the Rod, Spoil the Network Security? Economic Analysis of Sanctions Online Vaibhav Garg L. Jean Camp

    Add to Reading List

    Source URL: www.ljean.com

    Language: English - Date: 2015-02-25 17:27:02
    497Crime prevention / Criminology / Intelligence / Military intelligence / Crime analysis / Intelligence-led policing / Intelligence analysis / Criminal intelligence / Evaluation / Law enforcement / National security / Crime

    PROGRAM APPROVED No / SUBJECT PROGRAM SUBJECT CODE

    Add to Reading List

    Source URL: www.sisekaitse.ee

    Language: English - Date: 2015-04-07 04:52:56
    498Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    499Finance / Investment / Equity securities / Fundamental analysis / Shares outstanding / Warrant / Security / Corporate finance / Financial economics / Stock market

    tal of totalno.no. convertible no. OT OT snares

    Add to Reading List

    Source URL: www.superspinning.com

    Language: English - Date: 2015-04-01 01:45:04
    500Prevention / Security / Quality / Validation / Validity / Quality management system / ISO 22000 / Hazard analysis and critical control points / Safety Management Systems / Safety / Pharmaceutical industry / Food safety

    B Module: Feed Safety Assurance GMP+ B1.2 Production, Trade & Services 1.2

    Add to Reading List

    Source URL: gmpplus.org

    Language: English
    UPDATE