Security engineering

Results: 11317



#Item
711

(Poster) Sonar Phishing: Pinpointing Highly Vulnerable Victims for Social Engineering Attacks Robert Larson, Matthew Edwards, Alistair Baron, Awais Rashid Security Lancaster, School of Computing and Communications, Lanca

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:22
    712Security / Occupational Safety and Health Administration / Industrial hygiene / Occupational safety and health / Occupational Safety and Health Act / Process safety management / HAZWOPER / Safety / Risk / Safety engineering

    https://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=

    Add to Reading List

    Source URL: www.crsledge.com

    Language: English - Date: 2015-05-12 12:05:00
    713Computer security / Debugging / Malware / Security / Linux malware

    REVERSE ENGINEERING MALWARE ANALYSIS REMA About the course

    Add to Reading List

    Source URL: www.silensec.com

    Language: English - Date: 2014-04-29 06:19:51
    714Computing / Computer crimes / Computer network security / Multi-agent systems / Malware / Botnet / Phishing / Anti-spam techniques / Social engineering / Spamming / Cybercrime / Internet

    PDF Document

    Add to Reading List

    Source URL: londonactionplan.org

    Language: English - Date: 2015-06-16 12:09:17
    715Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

    The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2002-04-30 18:05:07
    716Security / Industrial hygiene / Occupational Safety and Health Administration / Occupational safety and health / HAZWOPER / Process safety management / Safety / Safety engineering / Risk

    https://www.osha.gov/pls/oshaweb/owadisp.show_document?p_table=

    Add to Reading List

    Source URL: www.crsledge.com

    Language: English - Date: 2015-05-12 12:04:59
    717Cyberwarfare / Malware / Phishing / Social engineering / Spamming / Computer security / Operations security / Spyware / Classified information / Security / Espionage / Computer network security

    Ex+Op Power Point Master Slide Template, Oct 06, NU [D11]

    Add to Reading List

    Source URL: www.mc.nato.int

    Language: English - Date: 2013-03-08 11:16:37
    718Computing / Technology / Network access / Computer network security / Hotspot / IEEE 802.11 / Nintendo Wi-Fi Connection / Captive portal / Tru / Wi-Fi / Electronic engineering / Wireless access points

    ANYFI CONTROLLER DATASHEET KEY BENEFITS nn

    Add to Reading List

    Source URL: static.anyfinetworks.com

    Language: English - Date: 2015-06-22 11:17:40
    719Genetic engineering / World Food Prize / Agriculture / Agricultural science / Norman Borlaug / Sorghum / Monsanto / Genetically modified organism / Food security / Science / Food and drink / Biology

    Iowa Seed & Biosafety Vol. 25 No. 2 | Spring/Summer 2009 THE NEWSLETTER OF THE SEED SCIENCE CENTER AND BIOSAFETY INSTITUTE FOR GENETICALLY MODIFIED AGRICULTURAL PRODUCTS

    Add to Reading List

    Source URL: www.bigmap.iastate.edu

    Language: English - Date: 2009-12-06 18:29:22
    720Systems engineering / Safety / Costs / Cost–benefit analysis / ALARP / Risk analysis / Reliability engineering / Derailment / Science / Risk / Rail transport / Security

    Theme [SSTDevelopment of the Future Rail System to Reduce the Occurrences and Impact of Derailment Development of the Future Rail Freight System to Reduce the Occurrences and Impact of Derailment

    Add to Reading List

    Source URL: www.d-rail-project.eu

    Language: English - Date: 2015-03-23 10:52:36
    UPDATE