Security analysis

Results: 6956



#Item
881Security / Risk analysis / Internet privacy / Data security / Computer security

78 Sidaway St Chapman ACT 2611 AUSTRALIA Tel: +, Email:

Add to Reading List

Source URL: rogerclarke.com.au

Language: English - Date: 2014-05-22 16:14:48
882Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa / Euro / Card security code / Credit card / Europe / Almada / Caparica / Torre

IDA 2001 The Fourth International Symposium on Intelligent Data Analysis, September 13-15, 2001

Add to Reading List

Source URL: centria.di.fct.unl.pt

Language: English - Date: 2007-02-26 20:37:38
883Program analysis / Software quality / Fuzz testing / Cyclomatic complexity / Code coverage / Application security / Software security assurance / Black-box testing / Vulnerability / Software testing / Software metrics / Software engineering

Combining McCabe IQ with Fuzz Testing Combining McCabe IQ with Fuzz Testing Introduction

Add to Reading List

Source URL: www.mccabe.com

Language: English - Date: 2008-12-09 09:26:35
884Intelligence analysis / Central Intelligence Agency / Defense Intelligence Agency / Intelligence gathering disciplines / Intelligence / Director of National Intelligence / United States Intelligence Community / National Clandestine Service / Defense Intelligence Operations Coordination Center / National security / Espionage / United States Department of Defense

Microsoft Word - overview.docx

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:16
885Tamper resistance / Public-key cryptography / Power analysis / Encryption / Computer security / Timing attack / Password / Key size / Secure cryptoprocessor / Cryptography / Security / Espionage

Fairy dust, secrets, and the real world - Security & Privacy Magazine, IEEE

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:38:40
886Software / System software / SekChek Local / SekChek Classic / HP-UX / Microsoft Windows / Microsoft / Computer security / Computer-aided audit tools / Information technology audit

Used for over 15 years by multinationals across the world, SekChek’s automated analysis quickly determines how a company’s security controls stack up against similar deployments – not in theory, but using current,

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-01-14 03:23:06
887Intelligence analysis / Military intelligence / Intelligence / Central Intelligence Agency / United States Intelligence Community / Defense Intelligence Agency / Counterintelligence / Director of National Intelligence / Secretaría de Inteligencia / National security / Espionage / Data collection

FY2016 budget request for the National Intelligence Program - Fact Sheet

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-02-02 14:24:22
888Finance / Subprime mortgage crisis / Mortgage-backed security / Banking / Bank / Investment banking / Late-2000s financial crisis / Securitization / High-yield debt / Economics / Financial economics / United States housing bubble

Perspectives Major banks analysis NovemberSome calm amid the global storm

Add to Reading List

Source URL: pwc.com.au

Language: English - Date: 2015-02-15 23:33:15
889Finance / Financial crises / Debt / Mortgage-backed security / Economy of the United States / Subprime mortgage crisis / Late-2000s financial crisis / Bank / Securitization / Financial economics / Economics / United States housing bubble

MayMajor banks analysis Charting a course through the storm Six months ago, as the US subprime crisis had begun to roll through

Add to Reading List

Source URL: pwc.com.au

Language: English - Date: 2015-02-15 23:33:15
890Cyberwarfare / AlgoSec / McAfee / Network security / Firewall / Payment Card Industry Data Security Standard / Infrastructure optimization / Application firewall / Comparison of firewalls / Computer network security / Computer security / Computing

Solution Brief Simplify Management of Complex Firewall Policies Automate analysis, optimization, and risk assessment of policies within McAfee® Firewall Enterprise

Add to Reading List

Source URL: www.algosec.com

Language: English - Date: 2014-07-07 06:08:05
UPDATE