Security analysis

Results: 6956



#Item
971Bonds / Fixed income analysis / Deflation / Government bonds / Yield / Interest / Consumer Price Index / Certificate of deposit / United States Treasury security / Economics / Price indices / Inflation

Series I Bonds: Information Statement Table of Contents Introduction......................................................................................................................3 What Are Inflation and Deflati

Add to Reading List

Source URL: www.soundinvesting.org

Language: English - Date: 2001-11-05 13:42:31
972Data analysis / Anomaly detection / Data security / Outlier / RANSAC / Local outlier factor / Statistics / Data mining / Robust statistics

Distance Based Outlier Detection for Data Streams Luan Tran, Liyue Fan, Cyrus Shahabi Integrated Media Systems Center University of Southern California

Add to Reading List

Source URL: imsc.usc.edu

Language: English - Date: 2015-03-26 19:52:32
973Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Proxy server / HTTP Secure / Secure Shell / Cryptographic protocols / Computing / Secure communication

Performance Analysis of TLS Web Servers Cristian Coarfa, Peter Druschel and Dan S. Wallach Department of Computer Science Rice University Abstract TLS is the protocol of choice for securing today’s ecommerce and online

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:16:24
974Software / National security / Signals intelligence / Android software / IPhone / Flixster / General Packet Radio Service / Android / Smartphones / Computing / Cloud clients

(U) Converged Analysis of Smartphone Devices Converged mobile devices offering advanced capabilities, often with PC-like

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:30
975Cyberwarfare / Side channel attack / Smart card / Tamper resistance / Computer security / Cryptographic engineering / Power analysis / Security / Cryptography / Espionage

Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
976Malware / Technology / Computer hardware / Computing / VM / IBM

IBM Security HOW I FORCED AN ANDROID VULNERABILITY INTO BYPASSING MDM RESTRICTIONS + DIY MALWARE ANALYSIS

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-24 15:36:22
977Management / Internal control / Security / Business / Corporate governance / Entity-level controls / SOX 404 top–down risk assessment / Risk analysis / Auditing / Risk

PDF Document

Add to Reading List

Source URL: www.gammassl.co.uk

Language: English - Date: 2013-01-11 08:19:05
978Unmanned aerial vehicles / Military / Espionage / Intelligence / Intelligence analysis / Military terminology / Signals intelligence / National security

PDF Document

Add to Reading List

Source URL: s3.documentcloud.org

Language: English - Date: 2014-06-26 00:10:10
979Business / Risk management / Soil contamination / Risk / Security / Lindane / Cost–benefit analysis / Pesticide / Management / Actuarial science / Ethics

DOC Document

Add to Reading List

Source URL: www.pops.int

Language: English - Date: 2008-05-02 10:37:53
980Computing / Computer law / Federal Information Security Management Act / Risk analysis / Information security / Asset / Vulnerability / Performance metric / Domain Name System Security Extensions / Computer security / Security / Data security

PDF Document

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-06-05 07:48:28
UPDATE