Security engineering

Results: 11317



#Item
371Safety engineering / Occupational safety and health / Management / Security / Risk

Risk Assessment for Traders, Looters and Settlers Workshop, DIG, completed 28th AprilHazard: Workshop equipment People / Items at risk: Staff / teachers / pupils Comments: Hazards arising from incorrect handlin

Add to Reading List

Source URL: www.thejorvikgroup.com

Language: English - Date: 2014-07-18 08:24:45
372Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
373Software quality / Design for X / Symposium on Principles of Programming Languages / Reliability engineering / Computer security / Software / Fly-by-wire

Verified squared: does critical software deserve verified tools? Xavier Leroy INRIA Paris-Rocquencourt POPL 2011

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2011-02-02 12:03:33
374Management / Security / Project management / Risk / Systems engineering / Emergency management / Risk management / Air traffic control / Resilience / Goal

BALANCING GOAL TRADE-OFFS WHEN DEVELOPING RESILIENT SOLUTIONS: A CASE STUDY OF RE-PLANNING IN AIRLINE OPERATIONS CONTROL 1 Floor Richters , Jan Maarten Schraagen 1

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:36:02
375Social engineering / Spamming / Cybercrime / Identity theft / Phishing / Metric / Performance metric / HR Metric

Lance Spitzner www.securingthehuman.org/blog @securethehuman Security  Awareness  

Add to Reading List

Source URL: securingthehuman.sans.org

Language: English - Date: 2015-01-28 15:57:54
376Privacy / Identity management / Digital rights / Human rights / Privacy engineering / Security engineering / Internet privacy / Medical privacy / Information privacy / Privacy Impact Assessment

Privacy by Design-Engineering Privacy Workshop 3 Report Executive Summary Within the last few years, privacy experts in industry, government and academia have called for new thinking that enables engineering privacy into

Add to Reading List

Source URL: cra.org

Language: English - Date: 2015-12-30 13:06:46
377Internet Standards / Internet protocols / IETF Administrative Oversight Committee / Internet Engineering Task Force / Domain Name System Security Extensions / CloudFlare / Internet Message Access Protocol / Domain Name System / Internet of things

IAOC MinutesAttending: Jari Arkko [PRESENT] Scott Bradner [PRESENT] Tobias Gondrom [PRESENT] Chris Griffiths [PRESENT, Chair]

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2015-06-26 11:30:23
378Actuarial science / Management / Project management / Risk management / Security / Systems engineering / Governance /  risk management /  and compliance / Risk

Managing risk in an age of complexity Executive Summary Managing risk has never been so important for businesses, nor has

Add to Reading List

Source URL: go.sap.com

Language: English
379Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
380Data security / Cybercrime / Identity documents / Cryptography / Identity theft / Password / Security hacker / Data breach / Social engineering / Information security / Computer security / Email

Employee Training Series INFORMATION SECURITY TRAINING EXAMINATION 1. What is a BotNet? a.

Add to Reading List

Source URL: www.risk3sixty.com

Language: English - Date: 2015-01-31 14:51:24
UPDATE