Security engineering

Results: 11317



#Item
421Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
422United States Department of Homeland Security / Cyberwarfare / Infrastructure / National security / Critical infrastructure protection / Security engineering / DHS National Protection and Programs Directorate / Computer security / Sensitive security information

GAO-16-791T, CRITICAL INFRASTRUCTURE PROTECTION:DHS Has Made Progress in Enhancing Critical Infrastructure Assessments, but Additional Improvements are Needed

Add to Reading List

Source URL: docs.house.gov

Language: English
423Working groups / Internet Engineering Task Force / Open Vulnerability and Assessment Language / Consensus decision-making / Center for Internet Security / Mitre Corporation

OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Randy Taylor – ThreatGuard, Inc.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2015-07-09 13:27:01
424Life skills / Motivation / Business continuity and disaster recovery / National security / Resilience / Security / Psychological resilience / Ecological resilience / Community resilience / Social vulnerability / Adaptation to global warming / Resilience assurance

Modeling Dynamic Resilience to Climate Change Caused Natural Disasters Slobodan P. Simonović Department of Civil and Environmental Engineering Western University

Add to Reading List

Source URL: www.iclr.org

Language: English - Date: 2016-08-15 13:01:37
425Nuclear technology / Nuclear engineering / American Nuclear Society / Nuclear power / Nuclear safety and security / Outline of nuclear power / Anti-nuclear movement

Science of Nuclear Energy and Radiation Science Teacher Workshop July 22-26, 2013 Instructors and Speakers Bios Hosted by:

Add to Reading List

Source URL: local.ans.org

Language: English - Date: 2013-07-23 09:19:41
426Cybercrime / Cyberwarfare / Social engineering / E-commerce / Computer network security / Phishing / Denial-of-service attack / Computer security / Targeted threat / Bitcoin / Malware / Supply chain attack

Financial Sector Threats 2015 Year in Review 1 Table of Contents

Add to Reading List

Source URL: info.digitalshadows.com

Language: English - Date: 2016-06-14 16:59:05
427Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Application security / Software development process / Software development

The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater∗‡ Rainer B¨ohme†

Add to Reading List

Source URL: weis2016.econinfosec.org

Language: English - Date: 2016-05-18 13:31:12
428Security engineering / Security / Computing / Associated Locksmiths of America / Locksmithing / Crime prevention / Cryptography / Information governance / National security / Email / Computer security

Help SAVTA Reach New Heights in 2016 — and Win! We’re always looking for ways to improve your association. From adding member benefits to new classes, we work hard to give you the best value. But now we

Add to Reading List

Source URL: www.savta.org

Language: English - Date: 2016-03-01 16:34:44
429Computer architecture / Computing / Computer engineering / Central processing unit / Instruction set architectures / Processor register / Itanium / X86 / CPU cache / Optimizing compiler / 64-bit computing / Pointer

From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware Haibo Chen† , Xi Wu† , Liwei Yuan† , Binyu Zang† , Pen-chung Yew‡ , and Frederic T. Chong§ † ‡

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:08
430Software engineering / Computing / Software / Crime prevention / Cryptography / National security / Information governance / Secure communication / Perl / Computer security / Web development

Secure Web Development In Perl Jonathan Worthington French Perl Workshop 2007

Add to Reading List

Source URL: jnthn.net

Language: English - Date: 2014-10-21 09:51:16
UPDATE