Security engineering

Results: 11317



#Item
171Security / Engineering / Occupations / Systems engineering / Systems integrator / Iron Dome / Computer security / Reliability engineering

CONNECTING THE DOTS mPrest is a leading-edge global provider of mission-critical monitoring and control technology and solutions, enabling the integration of multiple complex systems that reduce project development time,

Add to Reading List

Source URL: www.mprest.com

Language: English - Date: 2015-10-19 16:55:50
172Security / Computer security / Compact Disc and DVD copy protection / Arxan Technologies / Copyright law / Prevention / Warez / Cryptography

Securing DRM and Multimedia Applications through Guard Technology Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft.

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:57:15
173Computing / Data security / Anomaly detection / Data mining / Computer programming / Cloud computing / Cloud storage / Tracing / Data lineage / CELAR

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
174Computer security / Security / Cyberwarfare / Computing / Federally Funded Research and Development Centers / National Cybersecurity Center of Excellence / Mitre Corporation / International Multilateral Partnership Against Cyber Threats / National security / Michigan Cyber Range / National Cybersecurity FFRDC

2015 ELECTRICAL AND COMPUTER ENGINEERING CURRENTS www.ece.udel.edu

Add to Reading List

Source URL: www.ee.udel.edu

Language: English - Date: 2015-11-02 16:42:25
175Technology / Computing / Security / Industrial Internet Consortium / Cyberwarfare / IIC / Internet / Interoperability / Enterprise architecture framework / Computer security

Engineering: The First Steps PURPOSE AND AUDIENCE This document provides an overview of the scope, mission, and status of the engineering work of the Industrial Internet Consortium (IIC). There are four audiences for thi

Add to Reading List

Source URL: www.iiconsortium.org

Language: English - Date: 2016-07-25 11:57:01
176Cryptography / Microsoft Windows / Computing / Computer network security / Authentication protocols / Kerberos / BitLocker / Password / Email

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
177Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
178United States Department of Homeland Security / Government / Security / Prevention / National security / Infrastructure / Cyberwarfare / Security engineering / Critical infrastructure protection / National Infrastructure Protection Plan / Critical infrastructure / Resilience

February 29, 2016 Volume 2, Issue 4 The Partnership Quarterly includes critical infrastructure security and resilience articles, highlights crosssector initiatives, and identifies training and exercise opportunities, ne

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-03-02 12:49:07
179Software / Computing / System software / Cloud computing / Database / Cloud database / Filesystem-level encryption / Cloud computing security / Distributed file system for cloud

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
180Assault rifles / AR-platform firearms / Mechanical engineering / Military technology / Semi-automatic rifles / SIG SG 550 / Security / M16 rifle / Light machine guns / Bolt-action rifles / SIG SG 540 / SIG SG 516

ASSAULT RIFLES SAN SWISS ARMS AG Industrieplatz 1 / P.O. BoxNeuhausen am Rheinfall / Switzerland Tel. +

Add to Reading List

Source URL: www.swissarms.ch

Language: English - Date: 2014-07-24 14:41:40
UPDATE