Security analysis

Results: 6956



#Item
681Globally Harmonized System of Classification and Labelling of Chemicals / Hazard analysis / CLP / Dangerous goods / Occupational safety and health / Environmental law / CLP Regulation / European Chemicals Bureau / Safety / Prevention / Security

Microsoft Word - headers.doc

Add to Reading List

Source URL: www.reachready.co.uk

Language: English - Date: 2012-02-22 06:09:20
682Security / Academi / Currituck County /  North Carolina / International Peace Operations Association / Government procurement in the United States / Military / Private military company / Military budget of the United States / Private military contractors / Iraq War / Mercenaries

Department of Defense’s Use of Contractors to Support Military Operations: Background, Analysis, and Issues for Congress Moshe Schwartz Specialist in Defense Acquisition Jennifer Church

Add to Reading List

Source URL: psm.du.edu

Language: English - Date: 2013-06-05 17:34:41
683Risk management / Safety engineering / Security / Actuarial science / Reliability engineering / Risk assessment / IT risk / IT risk management / Hazard analysis / Risk / Management / Safety

Appendix Risk management process and independent assessment PRELIMINARY SYSTEM DEFINITION Significant

Add to Reading List

Source URL: www.sjt.no

Language: English - Date: 2011-05-03 04:54:26
684Occupational safety and health / Public safety / Industrial hygiene / Risk analysis / Institut national de la recherche scientifique / Safety culture / Accident / Work accident / Safety / Risk / Security

WELCOMING WORDS Didier Baptiste, Perosh Chairman 2 Overview of INRS (France)

Add to Reading List

Source URL: www.perosh.eu

Language: English - Date: 2014-09-27 16:20:34
685Spamming / Statistics / Botnets / Bots / Storm botnet / Internet bot / Cluster analysis / Storm Worm / Hierarchical clustering / Computer network security / Computing / Multi-agent systems

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-14 18:18:35
686Labor economics / Socioeconomics / Labour law / Unemployment / Social Security / Medicare / Economics / Temporary Assistance for Needy Families / Social programs / Federal assistance in the United States / Government

JRAP 44(2): . © 2014 MCRSA. All rights reserved. The Importance of Non-labor Income: An Analysis of Socioeconomic Performance in Western Counties by Type of Non-labor Income Megan M. Lawson, Ray Rasker, Patricia

Add to Reading List

Source URL: www.bea.gov

Language: English - Date: 2015-05-14 09:11:12
687Food and drink / Malnutrition / Dietary supplements / Public health / Therapeutic food / Food security / Humanitarian aid / Nutrition / Health

Analysis of Nutritional Status in TharparkarNutrition Intervention in District Tharparkar Analysis of Nutritional Status

Add to Reading List

Source URL: www.hands.org.pk

Language: English - Date: 2015-02-13 02:03:32
688Safety Management Systems / Safety culture / Risk management / Risk assessment / Patient safety organization / Job safety analysis / Safety / Risk / Security

HELICOPTER FACTS Contact: Tony Molinaro

Add to Reading List

Source URL: www.ihst.org

Language: English - Date: 2012-03-29 14:53:51
689International security / Middle East / Security / Peacebuilding / Gidon Bromberg / Munqeth Mehyar / Friends of the Earth Middle East / Geoffrey Dabelko / John Paul Lederach / Peace / International relations / Environmental peacebuilding

Environmental Peacebuilding Theory and Practice A Case Study of the Good Water Neighbours Project and In Depth Analysis of the Wadi Fukin / Tzur Hadassah Communities

Add to Reading List

Source URL: foeme.org

Language: English - Date: 2013-01-21 02:42:44
690Physical Unclonable Function / Randomness / Analysis of algorithms / Challenge-response authentication / IP / Control flow graph / PUF / Pseudorandomness / Copy protection / Cryptography / Applied mathematics / Theoretical computer science

A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2012-06-05 18:18:00
UPDATE