Security engineering

Results: 11317



#Item
621Software engineering / Programming language theory / Computing / C / Struct / ALGOL 68 / BurrowsAbadiNeedham logic / OK / -calculus

Typing One-to-One and One-to-Many Correspondences in Security Protocols Andrew D. Gordon1 and Alan Jeffrey2 1 2

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:35:36
622

Energy Engineering Definition and Scope Energy security and environmental impact is one of the

Add to Reading List

Source URL: ame-www.usc.edu

Language: English - Date: 2014-05-05 13:51:53
    623Password / Security / Windows Vista / Computer engineering

    This is a reprint from the Channel Island PC Users Group (CIPCUG) The outer edge Review: RoboForm Program stores website logins, passwords By Jim Thornton

    Add to Reading List

    Source URL: www.sacpcug.org

    Language: English - Date: 2011-09-02 20:05:30
    624Modeling and simulation / United States Army Tank Automotive Research /  Development and Engineering Center / Warren /  Michigan / Operations security / United States Army TACOM Life Cycle Management Command / Security

    PDF Document

    Add to Reading List

    Source URL: www.ndia-mich.org

    Language: English - Date: 2013-08-20 07:59:50
    625Privacy / Digital rights / Human rights / Data security / Law / Personally identifiable information / Medical privacy / Health Insurance Portability and Accountability Act / Internet privacy / Information privacy / Privacy engineering

    PDF Document

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-02-12 12:31:56
    626

    JEB by PNF Software The Interactive Android Decompiler JEB is the most powerful Android app decompiler, designed for security professionals. Cut your reverse engineering time and leverage the API for your automation need

    Add to Reading List

    Source URL: www.pnfsoftware.com

    Language: English - Date: 2015-02-11 20:31:24
      627Sociology / Ethics / French words and phrases / Civil disobedience / Crime prevention / Sousveillance / Steve Mann / Opportunism / Closed-circuit television / Surveillance / National security / Security

      The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

      Add to Reading List

      Source URL: eyetap.org

      Language: English - Date: 2013-10-12 01:11:24
      6284G / Wireless / 5G / Wireless LAN / Telecommunications engineering / Computer network security / Wireless access points / Wireless networking / Technology / IEEE 802.11

      Microsoft Word - VigorAP800 V1.1.5 release note.doc

      Add to Reading List

      Source URL: www.draytek.nl

      Language: English - Date: 2015-01-08 09:04:07
      629Wi-Fi / Wireless LAN / Cloud computing / Internet / The Cloud / Wireless access point / Wireless / Wireless security / Aruba Networks / Technology / Wireless networking / Electronic engineering

      DATA SHEET BENEFITS CloudManager for Xclaim

      Add to Reading List

      Source URL: xclaim.s3.amazonaws.com

      Language: English - Date: 2015-05-30 22:24:03
      630Prevention / Security / DSEAR / Electrical equipment in hazardous areas / Explosive material / Liquefied petroleum gas / Dangerous goods / Electrical engineering / Electrical safety / Safety

      Microsoft Word - UKLPG Kenilworth Amdt 1 to COP20

      Add to Reading List

      Source URL: www.uklpg.org

      Language: English - Date: 2012-06-23 13:04:42
      UPDATE