Security analysis

Results: 6956



#Item
831United Kingdom / Economy of the United States / Income tax in Australia / Tax / Social Security / Income tax / Income Support / Tax policy and economic inequality in the United States / Household income in the United States / Taxation in the United States / Income tax in the United States / Public economics

“Churn” within the Australian tax and transfer systems oftoAn analysis using the Melbourne Institute Tax and Transfer Simulator (MITTS) by

Add to Reading List

Source URL: www.melbourneinstitute.com

Language: English - Date: 2009-12-14 18:46:22
832Ports in India / Authorized economic operator / Carriage of Goods by Sea Act / Port / Dry port / Container ship / Sirsiya / Transport / Business / Containerization

A Comparative Analysis of Container Security at Dry Ports in India and Europe

Add to Reading List

Source URL: www.icms.polyu.edu.hk

Language: English - Date: 2012-05-31 23:27:14
833OSI protocols / Domain name system / IP address / IPv6 / Computer network security / Spam filtering / Network architecture / Internet protocols / Computing

A Rendezvous-based Paradigm for Analysis of Solicited and Unsolicited Traffic DUST 2012 May 15, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
834Test case / Test / Computer security / Vulnerability / Software testing / Evaluation / Education

Special PublicationSource Code Security Analysis Tool Test Plan Draft 1 for public comment of Version 1.0

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:56
835Privacy / Public safety / Measuring instruments / Aviation security / Child welfare / Full body scanner / Transportation Security Administration / Surveillance / Marc Rotenberg / Security / Ethics / Crime prevention

MEMORANDUM Date: January 11, 2010 To: Interested Persons From: EPIC – Marc Rotenberg, John Verdi, Ginger McCall RE: Preliminary Analysis: Documents obtained from Department of Homeland Security concerning Body Scanners

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2010-11-22 11:13:51
836Financial economics / Mortgage-backed security / Finance / United States housing bubble / Economics / Monetary policy / Subprime crisis background information / National Asset Management Agency / Financial institutions / Bank / Investment banking

Microsoft Word - 59332_WL Major Banks Analysis May 2007 v18.doc

Add to Reading List

Source URL: pwc.com.au

Language: English - Date: 2015-02-15 23:28:28
837Central Intelligence Agency / Intelligence analysis / United States Intelligence Community / Director of National Intelligence / Military intelligence / Intelligence / Open-source intelligence / Intelligence cycle management / National security / Data collection / Espionage

STATEMENT FOR THE RECORD BY DR. STEPHEN A. CAMBONE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
838Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
839Intelligence analysis / Military intelligence / Central Intelligence Agency / McLean /  Virginia / United States Intelligence Community / Martin Scheinin / Geneva Centre for the Democratic Control of Armed Forces / Defense Intelligence Agency / Counter-terrorism / National security / Security / Espionage

Compilation of good practices that ensure respect for human rights by intelligence agencies

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:32:36
840Data collection / Call sign / Signals intelligence / Traffic analysis / Amateur radio / Signage / ITU prefix / Call signs in North America / Espionage / National security / Broadcast law

German exploitation of Russian communications through Traffic Analysis during World War II Prepared under the direction of the CHIEF, ARMY SECURITY AGENCY 1 May 1946 WDGAS-U [Declassified and approved for release by NSA

Add to Reading List

Source URL: www.numbersoddities.nl

Language: English - Date: 2013-03-04 17:01:47
UPDATE