Security engineering

Results: 11317



#Item
681Public safety / Transport engineering / Security engineering / Warning systems / Intelligent transportation system / Closed-circuit television / Security / Surveillance / National security

Pantone Logo no tagline-REG-white

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2015-01-21 16:45:44
682Computing / Phishing / Social engineering / Email / Computer-mediated communication / Verb / Gmail / Spamming / Internet / Computer crimes

Poster: Syntactic Element Similarity for Phishing Detection Gilchan Park Julia M. Taylor

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:27
683Military / Aerospace engineering / BGM-71 TOW / Defense Security Cooperation Agency / Military technology

DEFENSE SECURITY COOPERATION AGENCY WASHINGTON, DC 20301·2800 JANIn reply refer to: WPN

Add to Reading List

Source URL: samm.dsca.mil

Language: English - Date: 2013-04-08 15:04:46
684Security engineering / Gates / Wireless / Ubiquitous computing / ISO standards / Electronic lock / Key / Radio-frequency identification / Near field communication / Locksmithing / Technology / Locks

OKIDOKEYS Launches Complete Line of Smart Locks and Keys at the 2014 International CES® OKIDOKEYS enables secure, simple and practical key management to – anytime, anywhere – lock and unlock doors using cell phones,

Add to Reading List

Source URL: www.okidokeys.com

Language: English - Date: 2014-01-08 12:04:11
685Electronic engineering / Nintendo Wi-Fi Connection / Wireless network / Computing / Wi-Fi Alliance / Devicescape Software / Wi-Fi / Technology / Hotspot

INSERT Your LOGO {INSERT Organization} Monthly Security Tips

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2013-07-31 07:57:49
686Computing / Programming language theory / Information flow / Information theory / Crime prevention / National security / Data-flow analysis / Static single assignment form / Computer security / Data types / Type theory / Software engineering

Enforcing information flow policies by a three-valued analysis Jos´ee Desharnais Erwanne P. Kanyabwero

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
687Safety / Security / Trigger / Handgun / Semi-automatic pistol / Revolver / Firearm / Accidental discharge / Gun safety / Firearm safety / Firearm actions / Mechanical engineering

Instruction Manual General Safety, Operating Instructions and Limited Warranty READ CAREFULLY BEFORE USING YOUR FIREARM Important: Keep this manual with your firearm.

Add to Reading List

Source URL: www.taurususa.com

Language: English - Date: 2015-05-19 10:52:32
688Distributed computing architecture / NoSQL / Structured storage / Cross-platform software / MongoDB / JavaScript / CouchDB / JSON / SQL injection / Computing / Data management / Data

Server-Side JavaScript Injection Bryan Sullivan, Senior Security Researcher, Adobe Secure Software Engineering Team July 2011  

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 15:17:10
689Gated community / Real estate / Security engineering / Bathroom / Kitchen / Architecture / Rooms / Access control

Wish list for your new home how to buy a home - seminar YOUR LAND must

Add to Reading List

Source URL: www.palmharbor.com

Language: English - Date: 2013-11-01 16:01:11
690Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

Add to Reading List

Source URL: www.intel.nl

Language: English - Date: 2014-03-02 05:22:49
UPDATE