Security engineering

Results: 11317



#Item
781Electric power transmission systems / Electric power distribution / Electrical engineering / Monopoly / Smart grid / Electrical grid / Electric power transmission / Demand response / Sustainable energy / Electric power / Energy / Electromagnetism

Chapter II: Increasing the Resilience, Reliability, Safety, and Asset Security of TS&D InfrastructureQER Report: Energy Transmission, Storage, and Distribution Infrastructure | April 2015

Add to Reading List

Source URL: energy.gov

Language: English - Date: 2015-04-27 17:55:15
782Radio / Broadband / Digital Enhanced Cordless Telecommunications / Local loop / Software-defined radio / Burglar alarm / Wireless / Duplex / Walkie-talkie / Technology / Telecommunications engineering / Electronic engineering

Safety, Security and Entertainment The Turnkey Solution for all kind of Ships Safety, Security and Entertainment General

Add to Reading List

Source URL: www.l-3mps.com

Language: English - Date: 2011-07-12 17:02:14
783Advanced persistent threat / Hacking / Malware / Computer virus / Vulnerability / Antivirus software / Cyberwarfare / Security / Computer security

Poster: OpenAPT – Open-Source Advanced Persistent Threat for Academic Research Mordehai Guri, Tom Sela, Yuval Elovici Department of Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva, Israel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:48
784Security / Occupational safety and health / Industrial hygiene / Occupational Safety and Health Administration / Chemical engineering / HAZWOPER / Safety engineer / Right to know / Workplace safety / Safety / Safety engineering / Risk

COMMUNICATIONS DIRECTORY CORPORATE OFFICE 8001 VISTA TWILIGHT DRIVE - SUITE 101 TEL:

Add to Reading List

Source URL: www.jurispro.com

Language: English - Date: 2014-06-18 16:42:12
785Software bugs / Subroutines / C Standard Library / Return-to-libc attack / Control flow / Stack buffer overflow / Buffer overflow / Address space layout randomization / JMP / Computing / Software engineering / Computer programming

Out Of Control: Overcoming Control-Flow Integrity Enes Gökta¸s∗ Elias Athanasopoulos† Vrije Universiteit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
786Procedural programming languages / Cross-platform software / Technical communication / Macro / Source code / Information security / C / Scheme / Man page / Computing / Computer programming / Software engineering

Helmut Kurth atsec information security corp. 10th ICCC, Tromso - atsec information security tirsdag 1. september 2009

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2009-09-01 04:58:54
787Water management / Irrigation / Land management / Hydraulic engineering / Water resources / Interbasin transfer / Aquifer / International Water Management Institute / Water security / Water / Environment / Hydrology

Identifying Water Saving Opportunities: Examples from Three Irrigation Districts in China’s Yellow River and Yangtze Basins Nicolas Roost, David Molden, Zhongping Zhu and Ronald Loeve International Water Management Ins

Add to Reading List

Source URL: www.iwmi.cgiar.org

Language: English - Date: 2013-07-05 15:56:11
788Computing / Internet Assigned Numbers Authority / Domain Name System Security Extensions / Request for Comments / Internet Draft / Internet Engineering Steering Group / Internet Engineering Task Force / Transmission Control Protocol / Internet / Internet standards / Internet governance

IANA Plenary Report Michelle Cotton Manager, IANA Services ICANN July 2012 IETF-84, Vancouver

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2013-04-23 17:49:34
789Computer security / Phishing / Spamming / Transaction authentication number / Password / Usability / Authentication / Email / HTTP cookie / Security / Computing / Social engineering

Usability aspect of security October 30, Thursday) Scriber: Yamini Kannan This lecture is about a different side of security – the usability side of security – how do you ascertain that the technology being de

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
790Computer security / North American Electric Reliability Corporation / Critical infrastructure protection / Data security / Federal Energy Regulatory Commission / Reliability engineering / Western Electricity Coordinating Council / Security controls / National security / Economy of North America / Security

FAC TRMR-45 Reclamation Manual Directives and Standards TEMPORARY RELEASE (Expires)

Add to Reading List

Source URL: www.usbr.gov

Language: English - Date: 2015-05-21 12:53:16
UPDATE