Security analysis

Results: 6956



#Item
861Computer security / Identity management / Password strength / Password cracking / Password / Access control / Security

Summary Report: TESTBED AS400 System: Analysis Date: S65E570C 03-Nov-2013

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:28:41
862Intelligence analysis / Military intelligence / Counter-intelligence / United States Intelligence Community / Central Intelligence Agency / Counterintelligence / Media transparency / United States Intelligence Community Oversight / Intelligence cycle management / National security / Espionage / Data collection

Remarks of ODNI General Counsel Robert S. Litt on Transparency and Intelligence

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:30:30
863International security / Nuclear terrorism / Nuclear Non-Proliferation Treaty / Nuclear proliferation / Weapon of mass destruction / Federation of American Scientists / Hans M. Kristensen / Deterrence theory / Anti-nuclear movement in the United States / Nuclear weapons / International relations / Nuclear warfare

Terrorism Analysis Report 1 June 2011 Federation of American

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-02-17 21:53:21
864Torre / Euro / Card security code / Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa / Portugal / Credit card / Fee / Europe / Almada / Caparica

IDA 2001 The Fourth International Symposium on Intelligent Data Analysis, September 13-15, 2001

Add to Reading List

Source URL: centria.di.fct.unl.pt

Language: English - Date: 2007-02-26 20:37:38
865Safety engineering / Occupational safety and health / Risk management / Industrial hygiene / Risk assessment / Emergency management / Dangerous goods / Material safety data sheet / Hazard analysis / Safety / Risk / Security

SAFETY ASSESSMENT Guide for Major Hazard Facilities This guide is based on the national guideance material developed by Safe Work Australia as part of the harmonisation of work health and safety laws.

Add to Reading List

Source URL: pitac.org.au

Language: English - Date: 2014-03-25 00:00:53
866Evaluation / Evaluation methods / Security / Impact assessment / Risk / Cost–benefit analysis / Pesticide / Environmental impact assessment / IT risk management / Management / Ethics / Actuarial science

Secretariat of the Stockholm Convention page 4 Annex F Questionnaire (one per chemical) Chemical name (as used by the POPs Review Committee (POPRC)) Chlordecone 1,1a,3,3a,4,5,5,5a,5b,6-decachloro-octahydro-1,3,4-met

Add to Reading List

Source URL: www.pops.int

Language: English - Date: 2008-05-02 10:37:43
867Requirement / Energy in the United States / United States Department of Energy / National Nuclear Security Administration

DOE/NNSA Sandia Field Office Presentation for 2014 Safety Analysis Workshop DOE Directives Issues and Impacts Integrated Reviews – RevCom & Implementation

Add to Reading List

Source URL: www.efcog.org

Language: English - Date: 2015-01-24 18:30:37
868OS MasterMap / Geography of the United Kingdom / GIS software / Ordnance Survey / Geographic information system / OpenStreetMap / ArcGIS / Cartography / Maps / Geography

Street Networks and Risk: METHOD (3 of 5) Authors: Shane D Johnson and Toby Davies, UCL Department of Security and Crime Science METHOD: The first step in street segment analysis is to assemble street network data. In th

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2014-11-12 07:48:59
869Binary blob / Software / Computing / System software / Firmware / BIOS

A Large-Scale Analysis of the Security of Embedded Firmwares Andrei Costin, Jonas Zaddach, Aur´elien Francillon and Davide Balzarotti EURECOM Sophia Antipolis France {name.surname}@eurecom.fr

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-10 08:46:25
870Criminology / Crime / Public safety / Violence / Crime prevention / Targeting / Crime analysis / Intervention / Police / Law enforcement / Ethics / National security

Police Interventions to Reduce Violent Crime: A Review of Rigorous Research

Add to Reading List

Source URL: cebcp.org

Language: English - Date: 2013-05-15 18:11:15
UPDATE