Security engineering

Results: 11317



#Item
561Risk / Vulnerability / Security / Emergency management / Earthquake engineering / Social vulnerability / Natural hazard / Disaster / Flood / Hayward Fault Zone / Hazard / Seismic hazard

Housing and Community Risk Multiple Hazard Risk Assessment Dana Brechwald, Resilience Planner, ABAG Cynthia Kroll, Chief Economist and Primary

Add to Reading List

Source URL: resilience.abag.ca.gov

Language: English - Date: 2015-03-12 15:22:33
562Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
563

The 2nd International Workshop onEvolving Security & Privacy Requirements Engineering

Add to Reading List

Source URL: www.machinediscovery.com

Language: English - Date: 2015-06-10 19:33:36
    564Software engineering / Computing / Computer programming / Scripting languages / Persistence / Widget toolkits / Action Message Format / Adobe Flash / Python / PyQt / JavaScript / Serialization

    Constricting the Web: Offensive Python for Web Hacker at Black Hat USA 2010

    Add to Reading List

    Source URL: www.tssci-security.com

    Language: English - Date: 2013-01-17 00:16:29
    565Economy / Academia / Prevention / Security engineering / Privacy / Internet privacy / Password / Authentication / Software design pattern / Security Patterns / Pattern language / Consumer privacy

    Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences Nick Doty Mohit Gupta

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2013-07-23 08:07:23
    566

    Universal security for randomness expansion Carl A. Miller and Yaoyun Shi Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI 48109, USA carlmi,

    Add to Reading List

    Source URL: www.quantum-lab.org

    Language: English - Date: 2014-11-28 23:30:52
      567Public policy / Carnegie Mellon University / Capability-based security / Kathleen Carley / Military capability / Military / Engineering and Public Policy / Network science / ESCM-SP / Capability Maturity Model

      Structural Measurement Of Military Organization Capability

      Add to Reading List

      Source URL: www.casos.cs.cmu.edu

      Language: English
      568Cryptography / Computing / Security / Engineering / SimOS / Computer science / Software testing / Institute for Applied Information Processing and Communications / International Conference on Availability /  Reliability and Security / Computer security / Post-quantum cryptography

      Scientific Report First name / Family name Dr. Dimitrios Simos

      Add to Reading List

      Source URL: fellowship.ercim.eu

      Language: English - Date: 2015-04-23 10:01:32
      569Government / Critical infrastructure protection / Infrastructure / Security engineering / United States Department of Homeland Security / National security / Office of the Inspector General /  U.S. Department of Defense / Department of Defense Architecture Framework / Defense Technical Information Center / United States Military Standard / Defense Information Systems Agency / Global Information Grid

      DoD Instruction, February 2, 2015

      Add to Reading List

      Source URL: www.dtic.mil

      Language: English - Date: 2015-02-02 14:52:32
      570

      ASPIER: An Automated Framework for Verifying Security Protocol Implementations Sagar Chaki Software Engineering Institute

      Add to Reading List

      Source URL: www.andrew.cmu.edu

      Language: English - Date: 2016-02-12 12:31:57
        UPDATE