Security engineering

Results: 11317



#Item
481Cybercrime / Social engineering / Spamming / Computer network security / Identity theft / Phishing / Computer security / Targeted threat / Internet Security Awareness Training / Votiro

T2 SPEAR PHISHING PROTECTION T2 Employee Defense Training Transform your most exploited vulnerability into a powerful security asset. Spear phishing is the most prevalent and successful tactic used in advanced targeted

Add to Reading List

Source URL: pages.phishlabs.com

Language: English - Date: 2016-03-30 09:53:04
482Technology / Computing / Videotelephony / Security engineering / Ambient intelligence / Internet of things / Cisco Systems / Machine to machine / Computer security / Cisco Jasper / Mobiliya

White Paper The Internet of Things How the Next Evolution of the Internet Is Changing Everything

Add to Reading List

Source URL: www.cisco.com

Language: English
483

Green Lights Forever: Analyzing the Security of Traffic Infrastructure Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex Halderman Electrical Engineering and Computer Science Department Univers

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2015-09-23 11:33:10
    484

    DEFENSE & SECURITY DEFENSE & SECURITY Regional Strengths • Talent pipeline includes some 4,000 technology and engineering graduates annually

    Add to Reading List

    Source URL: www.alleghenyconference.org

    Language: English - Date: 2012-11-30 09:10:36
      485Software engineering / Software / Computer programming / Compiler construction / Parsing / Formal languages / Parser combinator / Syntax / Computability / Compiler-compiler / Compiler / Domain-specific language

      SECURITY The Bugs We Have to Kill S E R G E Y B R AT U S , M E R E D I T H L . PAT T E R S O N , A N D A N N A S H U B I N A

      Add to Reading List

      Source URL: langsec.org

      Language: English - Date: 2016-03-02 17:44:56
      486Prevention / United States Department of Homeland Security / Safety / Engineering / Infrastructure / Dependability / Quality / Safety engineering / Critical infrastructure / Reliability engineering

      ReSA4CI 2015: The 2nd International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection Workshop Programme September 22, 2015 Delft, The Netherlands

      Add to Reading List

      Source URL: safecomp2015.tudelft.nl

      Language: English - Date: 2015-09-03 11:54:38
      487Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

      Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2014-08-22 21:44:16
      488

      Cognitive Hacking and Digital Government: Digital Identity Paul Thompson Institute for Security Technology Studies Thayer School of Engineering, Dartmouth College Hanover, New Hampshire 03755, U.S.A.

      Add to Reading List

      Source URL: www.ists.dartmouth.edu

      Language: English - Date: 2008-09-11 13:38:10
        489

        SECURITY IN THE GRANDER ORDER OF THINGS Bertrand Meyer Professor of Software Engineering, ETH Zürich

        Add to Reading List

        Source URL: www.iwia.org

        Language: English - Date: 2016-01-14 06:08:13
          490Computer security / Espionage / Patent law / Reverse engineering / Technical intelligence / Bread / Property / Croitoru / Reverse / Personal life / Anthropology / Security

          Information for decision-making is ubiquitous: revisiting the reverse engineering mode in breadmaking technology Rallou Thomopoulos, Ahmed Chadli, Madalina Croitoru, Joël Abécassis, Gérard Brochoire and Hubert Chiron

          Add to Reading List

          Source URL: rcis2015.hua.gr

          Language: English - Date: 2015-05-25 09:38:30
          UPDATE