Security engineering

Results: 11317



#Item
41

International Journal of Engineering and Technical Research (IJETR) ISSN: , Volume-2, Issue-12, December 2014 A survey on providing security to the wireless sensor networks integrated with IOT Meghana D K, Monic

Add to Reading List

Source URL: www.erpublication.org

- Date: 2014-12-31 11:06:13
    42

    Behind the Scenes with iOS Security Black Hat 2016 Ivan Krstić Head of Security Engineering and Architecture, Apple

    Add to Reading List

    Source URL: www.blackhat.com

    - Date: 2016-08-08 16:57:06
      43

      Physical Security Monitoring of Engineering Structures Telelot VDD2/3 v4

      Add to Reading List

      Source URL: www.huggenberger.com

      - Date: 2014-06-11 08:00:50
        44

        Management and Production Engineering Selected subjects for Management and Production Engineering: Specialisations: production and service management, security management, quality management

        Add to Reading List

        Source URL: www.pwsz.nysa.pl

        - Date: 2012-10-25 03:08:57
          45

          On the design of lightweight link-layer security mechanisms in IoT systems S. Sciancalepore∗ , A. Capossele† , G. Piro∗ , G. Boggia∗ and G. Bianchi‡ ∗ Dep. of Electrical and Information Engineering (DEI), Po

          Add to Reading List

          Source URL: pdfs.semanticscholar.org

          - Date: 2015-08-11 19:03:22
            46

            Constrained Verifiable Random Functions from Indistinguishability Obfuscation Bei Liang, Hongda Li, Jinyong Chang State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sci

            Add to Reading List

            Source URL: security-lab.jaist.ac.jp

            - Date: 2015-11-22 02:25:22
              47

              Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

              Add to Reading List

              Source URL: www.pcisecuritystandards.org

              - Date: 2015-08-24 10:06:28
                48

                Closer to metal: Reverse engineering the Broadcom NetExtreme’s firmware Guillaume Delugr´e Sogeti / ESEC R&D guillaume(at)security-labs.org

                Add to Reading List

                Source URL: esec-lab.sogeti.com

                - Date: 2016-07-01 12:08:46
                  49

                  Need to hire tech, IT, engineering, and security-clearance professionals? Take advantage of the team that knows the language and habits of these unique candidates. We provide one of the easiest and most cost-effective wa

                  Add to Reading List

                  Source URL: www.targetedjobfairs.com

                  - Date: 2016-06-07 10:19:07
                    50

                    Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann

                    Add to Reading List

                    Source URL: jon.oberheide.org

                    - Date: 2015-10-11 18:23:19
                      UPDATE