Security engineering

Results: 11317



#Item
631Electronics / Computer network security / Mobile technology / IP Multimedia Subsystem / Multimedia / Telephony / Denial-of-service attack / Intrusion detection system / Internet Relay Chat / Technology / Videotelephony / Electronic engineering

Visio-DoS_paper_figures.vsd

Add to Reading List

Source URL: mcn.cse.psu.edu

Language: English - Date: 2009-01-20 15:41:05
632Public safety / Security engineering / Urban design / National security / Security / Crime / Crime prevention through environmental design / Criminology / Environmental psychology

Education & Safety Safety: CTA and Assessment • Implementing the CPTED Principles ensures that your facility receives the most current standards in school safety.

Add to Reading List

Source URL: www.ctagroup.com

Language: English - Date: 2015-06-03 13:37:17
633

Poster: A Framework for Distributed Anonymous Data Collection and Feedback Maxim Timchenko, Ari Trachtenberg Electrical and Computer Engineering Department, Boston University {maxvt, trachten}@bu.edu Abstract—Diagnosti

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:28
    634Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    635Computing / Computer crimes / Computer network security / Multi-agent systems / Malware / Botnet / Phishing / Anti-spam techniques / Social engineering / Spamming / Cybercrime / Internet

    PDF Document

    Add to Reading List

    Source URL: londonactionplan.org

    Language: English - Date: 2015-06-09 08:46:46
    636Safety engineering / Risk management / Hazard analysis / COSHH / Occupational safety and health / Risk assessment / Signage / Dangerous goods / Bodyguard / Risk / Safety / Security

    POTENTIAL RISKS HAZARD IDENTIFIED PERSONS RISK AT RISK RATING

    Add to Reading List

    Source URL: www.stleonardsfarm.com

    Language: English - Date: 2014-07-11 09:40:54
    637Hacking / Clickjacking / Computer security / Software testing / Likejacking / Tapjacking / Penetration test / Like button / Cross-site request forgery / Computing / Facebook / Social engineering

    Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking:

    Add to Reading List

    Source URL: 2011.zeronights.org

    Language: English - Date: 2011-12-28 02:05:06
    638Computer security / Social engineering / Rogue software / Scareware / Computer network security / Malware / Rogue security software / Botnet / Proxy server / System software / Antivirus software / Computing

    Chapter 1 The Underground Economy of Fake Antivirus Software Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald and Giovanni Vigna

    Add to Reading List

    Source URL: econ.ucsb.edu

    Language: English - Date: 2011-11-28 14:00:22
    639

      Bedizzole, Subject: Job opening - Engineering team After focusing on research, development and production of innovative passive security sensors, TSEC

    Add to Reading List

    Source URL: www.det.polito.it

    Language: English - Date: 2015-07-20 15:48:21
      640Cross-platform software / Evaluation / Software testing / Data security / Common Criteria / Kernel / SQL / Evaluation Assurance Level / Cross-site scripting / Computing / Software engineering / Computer security

      Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

      Add to Reading List

      Source URL: atsec.com

      Language: English - Date: 2010-08-10 10:53:40
      UPDATE