Security engineering

Results: 11317



#Item
31The Gridiron Compliance Model Aptible Gridiron helps software engineering teams easily stand up and maintain information security management programs that can meet stringent compliance and security requirements, such as

The Gridiron Compliance Model Aptible Gridiron helps software engineering teams easily stand up and maintain information security management programs that can meet stringent compliance and security requirements, such as

Add to Reading List

Source URL: www.aptible.com

- Date: 2018-03-21 14:07:12
    32Need to hire tech, IT, engineering, and security-clearance professionals? Take advantage of the team that knows the language and habits of these unique candidates. We provide one of the easiest and most cost-effective wa

    Need to hire tech, IT, engineering, and security-clearance professionals? Take advantage of the team that knows the language and habits of these unique candidates. We provide one of the easiest and most cost-effective wa

    Add to Reading List

    Source URL: www.targetedjobfairs.com

    - Date: 2017-05-16 17:41:34
      33Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

      Creating and Managing Computer Security Incident Handling Teams (CSIRTs) CERT Training and Education Networked Systems Survivability Software Engineering Institute

      Add to Reading List

      Source URL: www.first.org

      - Date: 2017-08-08 15:42:43
        34Google’s Cloud Vision API Is Not Robust To Noise Hossein Hosseini, Baicen Xiao and Radha Poovendran Network Security Lab (NSL), Department of Electrical Engineering, University of Washington, Seattle, WA arXiv:

        Google’s Cloud Vision API Is Not Robust To Noise Hossein Hosseini, Baicen Xiao and Radha Poovendran Network Security Lab (NSL), Department of Electrical Engineering, University of Washington, Seattle, WA arXiv:

        Add to Reading List

        Source URL: arxiv.org

        - Date: 2017-07-20 21:01:01
          35Tagungsband zum 13. Kryptotag Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft f¨ ur Informatik Security Engineering Group, Technische Universit¨at Darmstadt & CASED, Fachbereich Informatik

          Tagungsband zum 13. Kryptotag Workshop der Fachgruppe Angewandte Kryptologie in der Gesellschaft f¨ ur Informatik Security Engineering Group, Technische Universit¨at Darmstadt & CASED, Fachbereich Informatik

          Add to Reading List

          Source URL: tuprints.ulb.tu-darmstadt.de

          - Date: 2011-04-18 10:27:51
            36On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

            On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

            Add to Reading List

            Source URL: www.patrickmcdaniel.org

            - Date: 2016-11-26 07:36:40
              37Web Engineering Security and Forensics Education v11

              Web Engineering Security and Forensics Education v11

              Add to Reading List

              Source URL: ceur-ws.org

              - Date: 2010-06-24 06:51:12
                38THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Leaders Kamal Jabbour1,2 and Susan Older1 1

                THE ADVANCED COURSE IN ENGINEERING ON CYBER SECURITY A Learning Community for Developing Cyber-Security Leaders Kamal Jabbour1,2 and Susan Older1 1

                Add to Reading List

                Source URL: www.cis.syr.edu

                - Date: 2004-09-16 15:50:23
                  39An Empirical Study on the Relationship between Software Security Skills, Usage and Training need in Agile Settings Tosin D. Oyetoyan, Daniela S. Cruzes, Martin G. Jaatun Department of Software Engineering, Safety & Secur

                  An Empirical Study on the Relationship between Software Security Skills, Usage and Training need in Agile Settings Tosin D. Oyetoyan, Daniela S. Cruzes, Martin G. Jaatun Department of Software Engineering, Safety & Secur

                  Add to Reading List

                  Source URL: dl.dropboxusercontent.com

                    40Embedded Devices Security and Firmware Reverse Engineering BH13US Workshop Jonas Zaddach

                    Embedded Devices Security and Firmware Reverse Engineering BH13US Workshop Jonas Zaddach

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2013-07-31 04:48:48