Security analysis

Results: 6956



#Item
821DNS spoofing / Hacking / Name server / Resolver / Forwarder / Cooperative Association for Internet Data Analysis / Query / Target Corporation / Internet / Domain name system / Computing / Computer network security

Strange Things Found in an Open Resolver Survey Duane Wessels The Measurement Factory/CAIDA WIDE+CAIDA Workshop #9

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:43:57
822Spatial data analysis / Crime mapping / Human geography / CrimeStat / Geographic information system / Spatial analysis / Thematic map / CompStat / Crime analysis / Statistics / Criminology / Law enforcement

Security Journal, 2008, 21, (4 – 28) © 2008 Palgrave Macmillan Ltd 0955– $30.00 www.palgrave-journals.com/sj The Utility of Hotspot Mapping for Predicting Spatial Patterns of Crime

Add to Reading List

Source URL: www.palgrave-journals.com

Language: English
823Emergency management / Hazard analysis / Hazards / Hazard / Weapon of mass destruction / Job safety analysis / Risk assessment / Management / Risk / Security

Information Hazards: A Typology of Potential Harms from Knowledge Nick Bostrom Faculty of Philosophy & Oxford Martin School Oxford University [Published in Review of Contemporary Philosophy, Vol): pp]

Add to Reading List

Source URL: www.fhi.ox.ac.uk

Language: English - Date: 2013-06-07 09:45:21
824Soviet Union–United States relations / Counter-intelligence / Intelligence analysis / Military intelligence / Atomic spies / Counterintelligence / John Anthony Walker / Foreign Intelligence Service / Clandestine HUMINT / Espionage / National security / Cyberwarfare

Microsoft Word - TRChanges in Espionage by Americansdoc

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 15:09:46
825Applied psychology / Actuarial science / Evaluation methods / Security / Needs assessment / Evaluation / Content analysis / Risk / Participatory GIS / Science / Sociology / Ethics

Attachment 2: Social Science Services

Add to Reading List

Source URL: coast.noaa.gov

Language: English - Date: 2015-02-11 14:19:04
826Business / Risk / Security / Emergency management / Cost–benefit analysis / Stockholm Convention on Persistent Organic Pollutants / Systems engineering process / Environmental governance / Precautionary principle / Management / Ethics / Actuarial science

UNEP/POPS/POPRCUNEP/POPS/POPRC.3/CRP.3 UNEP/POPS/POPRC.3/20

Add to Reading List

Source URL: www.pops.int

Language: English
827Bond / Government debt / Security / Euro / Economic history / Debt levels and flows / European sovereign debt crisis / Economics / European Union / European Central Bank

New statistical indicators on government debt securities and their use in fiscal analysis and surveillance

Add to Reading List

Source URL: www.ecb.europa.eu

Language: English - Date: 2015-02-05 10:35:52
828Military intelligence / Signals intelligence / Intelligence analysis / Privacy of telecommunications / Counter-intelligence / Central Intelligence Agency / United States Intelligence Community / Information security / Office of Intelligence and Counterintelligence / National security / Espionage / Security

UNCLASSIFIED PPD-28 IMPLEMENTATION DEPARTMENT OF ENERGY OFFICE OF INTELLIGENCE AND COUNTERINTELLIGENCE DOE-IN POLICY GUIDANCE NUMBER 28.1

Add to Reading List

Source URL: www.dni.gov

Language: English - Date: 2015-02-02 14:08:44
829British society / Housing Benefit / Benefit fraud / Social Security / Government / Error / Full cost accounting / Department for Work and Pensions / Cost–benefit analysis / United Kingdom / Measurement / Affordable housing

NAO VFM Report (HC 569, ): Minimising the cost of administrative errors in the benefit system (executive summary)

Add to Reading List

Source URL: www.nao.org.uk

Language: English - Date: 2013-09-05 05:07:17
830Cryptographic protocols / Authentication protocol / PERMIS / Authentication / Communications protocol / Data / Information / Security

Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge by Hongbin Zhou, B.E., M.E.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-10 06:07:06
UPDATE