Security engineering

Results: 11317



#Item
101Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2009-04-29 19:50:23
102Government / Prevention / Building engineering / Labour law / Social security / Unemployment benefits / Safety / Submittals / Office of Management and Budget / UI / Information security

CLASSIFICATION EMPLOYMENT AND TRAINING ADMINISTRATION ADVISORY SYSTEM U.S. DEPARTMENT OF LABOR Washington, D.C

Add to Reading List

Source URL: workforcesecurity.doleta.gov

Language: English - Date: 2014-07-29 14:15:36
103Video / Cameras / Imaging / Digital media / Information science / Pantiltzoom camera / Security engineering / HDCI / Video camera / USB / IP camera

KalkulationLumens_2016_V2

Add to Reading List

Source URL: www.kolok.ch

Language: English - Date: 2016-04-25 08:47:10
104Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
105Engineering / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Data security / Reliability engineering / Systems engineering / Computer security / Information security

IPA事業案内2015(表紙

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-07-11 21:19:33
106Computing / Security engineering / Security / Smart devices / Vacation rental / Internet of Things / Smart lock / Renting / Key / Computer security / Smart TV / Draft:August Home

60 Percent of Guests Would Pay More for a Vacation Rental with a Smart Home Feature, August Home Study Reveals Smart Tech Helping Short-Term Rental Hosts Deliver Experience Superior to Hotels; Property More Secure with a

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-08-03 16:40:46
107Cyberwarfare / Computer security / Engineering / Automation / Malware / Rootkits / Stuxnet / Programmable logic controller / Computer worm / Transmission Control Protocol / Blaster

PLC-Blaster: A Worm Living Solely in the PLC Ralf Spenneberg, Maik Brüggemann, Hendrik Schwartke 1 OpenSource Security Ralf Spenneberg

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2016-03-30 22:52:18
108Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
109Safety / Security / Prevention / Safety engineering / Chemical warfare / Homeland security / Occupational safety and health / Weapon of mass destruction / Chemical Facility Anti-Terrorism Standards

The Global Summit on Chemical Safety and Security CHEMSS 2016 Kielce, Poland, 18–20 AprilPROGRAMME

Add to Reading List

Source URL: www.chemss2016.org

Language: English - Date: 2016-04-16 19:58:44
110Safety / Prevention / Security / Occupational safety and health / Civil engineering / Construction (Design and Management) Regulations / General contractor / NEBOSH / Tick / Asbestos / Construction / Computer security

Safety Assessment Scheme Questionnaire (V18 – Assessment Required

Add to Reading List

Source URL: www.greenlightsc.co.uk

Language: English - Date: 2016-04-26 05:42:47
UPDATE