Security analysis

Results: 6956



#Item
801Employment compensation / Income distribution / Labour relations / Human resource management / Social Security / Unemployment / Minimum wage / Welfare / National Center for Policy Analysis / Socioeconomics / Labor economics / Economics

IDEAS CHANGING THE WORLD Reflections During Black History Month: What Public Policies Are Hurting African-Americans? Statement for the Record

Add to Reading List

Source URL: www.ncpa.org

Language: English - Date: 2015-02-12 13:52:01
802Internet protocols / Routing / Internet standards / DNSSEC / Domain Name System Security Extensions / IPv6 / Router / Darknet / Default route / Network architecture / Internet / Computing

Turning  Down  the  Lights:   Darknet  Deployment  Lessons  Learned   Casey  Deccio   DUST1st International Workshop on Darkspace and UnSolicited Traffic Analysis May 14, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
803Transparency / Data collection / Secretaría de Inteligencia / Intelligence analysis / Military intelligence / Intelligence cycle management / Methodology / National security / United States Intelligence Community

Principles of Intelligence Transparency for the Intelligence Community

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-02-03 12:44:06
804Law enforcement / 21st century in the United States / National Intelligence Strategy of the United States of America / United States Intelligence Community / Open-source intelligence / Intelligence analysis / DHS Office of Intelligence and Analysis / Intelligence-led policing / Central Intelligence Agency / National security / Government / Security

Microsoft Word - RL33616.doc

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 13:19:57
805Cyberwarfare / Information flow / Information theory / Memory leak / RSA / Computer security / Termination analysis / Batch file / Vulnerability / Electronic commerce / Computing / Security

Multi-run security Arnar Birgisson and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden Abstract. This paper explores information-flow control for batch-job programs that are allowed to be re

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2011-11-25 05:03:16
806Security / Hardware Trojan / Physical Unclonable Function / Side channel attack / Computer security / Power analysis / Threat / Cryptography / Cyberwarfare / Computer network security

ODETTE: A Non-Scan Design-for-Test Methodology for Trojan Detection in ICs M. Banga and M. Hsiao (Virginia Tech) 11:45 - 1:00: Lunch 1:00 - 2:00: Poster Session Session Chair: Patrick Schaumont

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2011-05-27 10:02:27
807Prevention / System safety / Safety culture / Airmanship / Crew resource management / Safety assurance / Human Factors Analysis and Classification System / Air safety / Safety / Security

LINE OPERATIONS SAFETY AUDIT LOSA (LINE OPERATIONS SAFETY AUDIT) BASIC ERROR MANAGEMENT CONCEPTS 1.1

Add to Reading List

Source URL: www.qitweb.com

Language: English - Date: 2012-07-20 09:19:31
808Security / Business / Failure / Materials science / Reliability engineering / Survival analysis / Bank / Risk management / Risk / Actuarial science / Management / Ethics

May 23, 2011 To whom it may concern: Mizuho Financial Group, Inc. Mizuho Bank, Ltd. Causes and Plans for Improvements and Counter-Measures based on the Recent Computer System Failures

Add to Reading List

Source URL: www.mizuhobank.com

Language: English - Date: 2013-03-27 06:30:12
809Crime prevention / National security / Information technology audit / Computer-aided audit tools / SekChek Local / Information security / Password / Vulnerability / Email / Security / Computer security / Computing

 Product and Service Overview What is SekChek? SekChek® is a family of automated security analysis and benchmarking tools initially designed for use by audit firms and their clients. It measures computer security ag

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-01 07:39:47
810Law / Criminology / Surveillance / Public safety / Police / Crime analysis / Law enforcement / National security / Crime prevention

The Receptivity of Officers to Empirical Research and Evidence-Based Policing: An Examination of Survey Data from Three Agencies Cody W. Telep & Cynthia Lum Background: One important step in moving forward with evidence-

Add to Reading List

Source URL: cebcp.org

Language: English - Date: 2015-04-07 12:00:06
UPDATE