Security analysis

Results: 6956



#Item
781Law enforcement / Security / Public records / Crime prevention / Background check / Federal Bureau of Investigation / Security guard / Polygraph / Notary public / Law / Government / Criminal records

Requirements for licensure as a Voice Stress Analysis Examiner

Add to Reading List

Source URL: static.ark.org

Language: English - Date: 2015-03-27 11:28:13
782Ethics / Risk analysis / Project management / Actuarial science / Information technology management / IT risk / Risk management / Risk register / Management / Risk / Security

Project Risk Report 2 Risk Report (To be used with DoIT Risk and Issues Log Template)

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-07-21 15:53:25
783National security / Network theory / Social networks / Cybernetics / Network science / Social network analysis / Kathleen Carley / Iraqi insurgency / Counter-terrorism / Networks / Structure / Science

SPECIALSECTION Counterterrorism’s New Tool: ‘Metanetwork’ Analysis CREDIT: STEFFEN MERTEN COURTESY OF PALANTIR

Add to Reading List

Source URL: www.johnbohannon.org

Language: English - Date: 2010-12-28 12:18:52
784Computer security / Cyberwarfare / Analysis / Netflow / Packet capture / Data security / Network intelligence / Security event manager / Security information and event management / Computer network security / Computing / Deep packet inspection

Use Case Study Security Information and Event Management (SIEM) Use Case With 5 Billion IoT devices by the end of this decade*, next generation SIEMs need to tackle latest security breaches and issues with advanced anal

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-05-28 10:26:33
785Privacy law / Computing / Security / Data security / Guardium /  an IBM Company / BigFix / Computer security / Data privacy / Health Insurance Portability and Accountability Act

Wave Reporter Comprehensive Reporting and Analysis Protector – block or encrypt data transferred to external media and devices (CD/DVD, USB, Firewire, etc.) and block

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:19
786Meteorology / Atmospheric sciences / Anomaly detection / Data security / NetCDF / Anomaly / Climatology / Statistics / Data mining / Data analysis

Improving Oceanographic Anomaly Detection Using High Performance Computing Thomas Huang, Ed Armstrong, George Chang, Toshio Chin, Brian Wilson, Tong (Tony) Lee, Victor Zlotnicki. Jorge Vazquez and Michelle Gierach Jet Pr

Add to Reading List

Source URL: www.sccoos.org

Language: English - Date: 2015-05-13 15:32:26
787Government / European Union / Political philosophy / National security / Agencies of the European Union / Frontex / Smuggling

Analysis Manufacturing consent, EU style: The EU’s anti-smuggling military operation Steve Peers, Professor of Law, University of Essex Twitter: @StevePeers A EU military planning document reiterates that the EU’s ne

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2015-05-26 09:08:59
788Data / Information / Network intelligence / Metadata / Deep content inspection / Packet Processing / Computer network security / Deep packet inspection / Computing

ADAPT IN REAL TIME WITH ADVANCED SERVICE CLASSIFICATION FROM LEADERS QOSMOS AND NAPATECH Qosmos, the leader in Deep Packet Inspection (DPI) and metadata analysis software, and Napatech, the world’s largest vendor of ac

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:08:25
789Government / Public administration / United States Code / Security guard / Law

State of Utah Administrative Rule Analysis NOTICE OF PROPOSED RULE * The agency identified below in box 1 provides notice of proposed rule change pursuant to Utah Code Section 63G-3-301. * Please address questions regard

Add to Reading List

Source URL: www.dopl.utah.gov

Language: English - Date: 2015-05-20 10:18:04
790Markup languages / Software architecture / Web development / JavaScript / XMLHttpRequest / HTML5 / Web application / Cross-site scripting / Cross-Origin Resource Sharing / Computing / World Wide Web / Ajax

A Security Analysis of Emerging Web Standards HTML5 and Friends, from Specification to Implementation Philippe De Ryck, Lieven Desmet, Frank Piessens and Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium {fir

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
UPDATE