Security engineering

Results: 11317



#Item
521Actuarial science / Project management / Economy / Systems engineering / Academia / Safety / Risk / Security / Risk management / Occupational safety and health

EEC Canberra Risk Management Plan

Add to Reading List

Source URL: education.aec.gov.au

Language: English - Date: 2013-07-22 02:30:08
522

1 Kepler - Raising Browser Security Awareness Thomas Wahlberg, Petri Paakkola, Christian Wieser, Marko Laakso and Juha R¨oning University of Oulu, Department of Computer Science and Engineering OUSPG

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-02-28 16:08:30
    523Social engineering / Cybercrime / Identity theft / Crime / Computing / Phishing / Spamming / Cyberspace / SMS phishing / Voice phishing / Online banking / Malware

    Fraud Trends HSBCnet Online Security Controls En français | En Español | 繁體中文 | 简体中文 | ‫اﻟﻌرﺑﯾﺔ‬ PUBLIC

    Add to Reading List

    Source URL: connect-content.us.hsbc.com

    Language: English - Date: 2015-11-24 16:06:57
    524

    Supporting Security and Consistency for Cloud Database Luca Ferretti, Michele Colajanni, and Mirco Marchetti Department of Information Engineering University of Modena and Reggio Emilia {luca.ferretti,michele.colajanni,m

    Add to Reading List

    Source URL: weblab.ing.unimo.it

    Language: English - Date: 2013-01-07 10:00:57
      525Computing / Computer security / Software / Project management / Threat model / Business / Enterprise modelling / Software engineering / Process management / Threat / Software development / Business process modeling

      Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 12:01:57
      526Safety engineering / Evaluation / Safety / Dependability / Quality / Security / Terraillon / Tea / Euthenics

      SASSUR 2015: The 4th International Workshop on Next Generation of System Assurance Approaches for safety-critical Systems Workshop Programme September 22, 2015 Delft, The Netherlands

      Add to Reading List

      Source URL: safecomp2015.tudelft.nl

      Language: English - Date: 2015-09-14 10:24:22
      527Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

      PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

      Add to Reading List

      Source URL: dl.dropboxusercontent.com

      Language: English
      528Government / Prevention / Building engineering / Labour law / Social security / Unemployment benefits / Safety / Submittals / Office of Management and Budget / UI / Information security

      CLASSIFICATION EMPLOYMENT AND TRAINING ADMINISTRATION ADVISORY SYSTEM U.S. DEPARTMENT OF LABOR Washington, D.C

      Add to Reading List

      Source URL: ows.doleta.gov

      Language: English - Date: 2014-07-29 14:15:36
      529Software / Computer architecture / System software / Computing platforms / Smartphones / Cross-platform software / Alphabet Inc. / Android / Linux namespaces / Mobile security / Kernel / Namespace

      PINPOINT: Efficient & Effective Resource Isolation for Mobile Security & Privacy Paul Ratazzi, Ashok Bommisetti, Nian Ji, and Prof. Wenliang (Kevin) Du Department of Electrical Engineering & Computer Science

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2015-06-05 20:26:09
      UPDATE