Security engineering

Results: 11317



#Item
271Computing / Cloud computing / Cloud infrastructure / Cloud storage / Cloud Security Alliance / Virtual private cloud / HP Cloud / Perspecsys

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-02 08:31:10
272Software / Security / Embedded system / Systems engineering / Computer security / Mathcad / Mentor Graphics / AEgis Technologies / Mercury Systems

Technology Service Corporation an employee-owned company Systems Development and Production Division, 310 Voyager Way, Huntsville, ALwww.tsc.com

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2016-08-01 09:15:52
273Computer hardware / Electrical engineering / Audio engineering / Microphone / Sound recording / Phone connector / DC connector / Headset / Preamplifier / Battery charger / AC adapter / USB

RETAIL PRICE LIST April 2016 MAIL ORDER INFORMATION The following will speed your order or enquiry giving you the security you expect when dealing with a firm that has been in business for over 40 years. Here is a list

Add to Reading List

Source URL: www.jayceecoms.com

Language: English - Date: 2016-07-10 16:15:07
274Firearm actions / Bolt-action rifles / Mechanical engineering / Military technology / Police weapons / Security / Bolt action / Sniper rifles / Action / Safety / Single-shot / Headspace

AT308 RIFLE USER MANUAL Accuracy International Ltd. Portsmouth. UK. Tel + 1225 Fax + 1852

Add to Reading List

Source URL: www.accuracyinternational.com

Language: English - Date: 2015-08-26 05:39:10
275Education / Security / Distance education / Educational psychology / Educational technology / Information technology / Systems engineering / Copernicus Programme / System / Computer security

SCENARIO: Connect will experiment with various scenarios, including from the area of Global Monitoring for Environment & Security. ‘Global Monitoring for Environment and Security’ (GMES) represents a European concert

Add to Reading List

Source URL: www.connect-forever.eu

Language: English - Date: 2012-01-31 02:57:39
276Prevention / Computing / Software engineering / Software requirements / Computer security / ISO/IEC 27001:2013 / Requirement / Information security

Model Operating Requirements - Guidance Notes - Version 2 Date of Issue: June 2014

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:41:51
277Crime prevention / Prevention / Security / Safety / Criminology / Law enforcement / Security engineering / National security / Crime prevention through environmental design / Surveillance / Defensible space theory / Closed-circuit television

Published in: Internationale Architecture Biennale Rotterdam (ed.) Open City: Designing Coexistence, Amsterdam: Sun 2009, Michael Zinganel Crime does pay! The Structure-Building Power of Crime for Urban Planning

Add to Reading List

Source URL: www.zinganel.mur.at

Language: English - Date: 2014-03-04 19:28:21
278Computing / Technology / Security / Software engineering / Product development / Quality / Specification / Technical communication / Business Process Execution Language / Computer security

Outline Choreography Specification Language Security Policy Specification Language Enforcement Approach Conclusion

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
279Security / Education / Education policy / Science education / Cybercrime / National security / Science and technology / Science /  technology /  engineering /  and mathematics / Computer security / Draft:Nancy Conrad

For immediate Release Wednesday, March 26 U.S. News STEM Solutions National Leadership Conference partners with LifeJourney to bring Cyber Security to America’s Schools Technology enables students to test drive their f

Add to Reading List

Source URL: usnewsstemsolutions.com

Language: English - Date: 2014-03-26 12:05:41
280Computing / Computer architecture / Security engineering / Computer network security / Dynamic Host Configuration Protocol / Network service / Windows / Computer security

SECURITY COMPLIANCE MANAGEMENT THE ELEMENTAL COMPLIANCE SYSTEM Managing security in ever-changing enterprise networks requires that compliance officers and IT security managers continuously measure how well networked co

Add to Reading List

Source URL: www.nsaservices.com

Language: English - Date: 2013-03-28 15:31:27
UPDATE