Security engineering

Results: 11317



#Item
461

International Workshop on Privacy Engineering http://ieee-security.org/TC/SPW2016/IWPE May 26 th , 2016 at the Fairmont, San Jose, CA Co-located with 37 th IEEE Symposium on Security and Privacy 08:45-09:00 09:00-09:15

Add to Reading List

Source URL: ieee-security.org

Language: English
    462

    Defense-in-Depth Security for Enterprise IoT Addressing the fundamental vulnerabilities of IP communications “Host Identity Protocol is recognized by the Internet Engineering Task Force (IETF) community as the next pos

    Add to Reading List

    Source URL: www.temperednetworks.com

    Language: English - Date: 2016-03-21 11:51:52
      463Information science / Semantic Web / Knowledge / Information / Knowledge engineering / Knowledge representation / Technical communication / Ontology / George Mason University / Semantic technology / Electronic submission / Web Ontology Language

      Preliminary Call for Papers Eleventh International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDSGeorge Mason University, Fairfax, VA, USA Institute for Defense Analyses, Alexandr

      Add to Reading List

      Source URL: stids.c4i.gmu.edu

      Language: English - Date: 2016-04-15 10:07:06
      464Engineering / Real estate / Construction / Humanitarian aid / Seismology / Structural engineering / Disaster preparedness / Occupational safety and health / Earthquake engineering / Federal Emergency Management Agency / Earthquake / United States Department of Homeland Security

      This annual report on the National Earthquake Hazards Reduction Program (NEHRP) is submitted to Congress by the Interagency Coordinating Committee (ICC) of NEHRP, as required by the Earthquake Hazards Reduction Program R

      Add to Reading List

      Source URL: www.nehrp.gov

      Language: English - Date: 2014-03-13 07:56:30
      465Systems engineering / Security / Educational psychology / Educational assessment / Standards-based education / Thought / Risk management / International Organization of Securities Commissions

      Assessment Methodology for the CPSS-IOSCO Principles for Financial Market Infrastructures Semana de Pagos 2013 Cartagena, 21 November 2013

      Add to Reading List

      Source URL: www.forodepagos.org

      Language: English - Date: 2013-12-02 13:37:17
      466Actuarial science / Risk / Academia / Prevention / Financial risk / Risk analysis / Security / Systems engineering / Risk management / Finance / Economic model / Value at risk

      RISK MANAGEMENT LEVEL: GradesThis lesson builds conceptual understanding, scientific investigation and practical reasoning while developing and using reading, writing, and mathematics.

      Add to Reading List

      Source URL: www.niehs.nih.gov

      Language: English - Date: 2016-06-16 19:47:18
      467Prevention / Security / Computer security / Data security / Cryptography / National security / Federal Information Security Management Act / Risk management framework / Information security / National Institute of Standards and Technology / Application security / Systems engineering

      Microsoft Word - SPspd-final

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-05-03 23:25:26
      468Computing / Software engineering / Computer programming / Subroutines / Software bugs / C standard library / Uncontrolled format string / Printf format string / C POSIX library / C / Variadic function / Printf

      USENIX Association Proceedings of the 10th USENIX Security Symposium Washington, D.C., USA

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2002-01-02 16:50:24
      469

      Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA

      Add to Reading List

      Source URL: 2010.hackitoergosum.org

      Language: English - Date: 2010-04-16 11:10:57
        470Hacking / Web design / Digital typography / News aggregators / Social engineering / Cross-site scripting / Cross-site request forgery / NoScript / Content Security Policy / JavaScript / Clickjacking / Cascading Style Sheets

        Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Horst Görtz Institute for IT-Security Ruhr-University Bochum, Germany

        Add to Reading List

        Source URL: www.nds.rub.de

        Language: English - Date: 2012-08-16 02:39:46
        UPDATE