Security engineering

Results: 11317



#Item
801MIX / Computer programming / Computing / Software engineering / Models of computation / Pointer / Computer / Machine code

Micro-Policies Formally Verified, Tag-Based Security Monitors Arthur Azevedo de Amorim1,2 Maxime D´en`es1,2 Nick Giannarakis2,3,4 C˘at˘alin Hrit¸cu2 Benjamin C. Pierce1 Antal Spector-Zabusky1 Andrew Tolmach5 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-05-18 15:05:49
802C++ / Java programming language / Cross-platform software / Java / Constructor / Null / Serialization / C++ classes / Viterbi algorithm / Computing / Software engineering / Computer programming

Vulnerability Fix Experiment SEORACLE-7 [Security vulnerabilities in Java SE, Issue 50] DISLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2013-02-04 06:32:56
803Safety engineering / Environmental law / Health sciences / Industrial hygiene / Medicine / Material safety data sheet / Right to know / Dangerous goods / Volatile organic compound / Safety / Health / Security

L. M. SCOFIELD COMPANY 6533 BANDINI BLVD. • LOS ANGELES, CALIFORNIASCOFIELD ROAD • DOUGLASVILLE, GEORGIAMATERIAL SAFETY DATA SHEET and WARRANTY T804 Rev

Add to Reading List

Source URL: www.scofield.com

Language: English - Date: 2012-10-12 09:06:45
804Biological engineering / George Church / Biological warfare / Health / Biology / Genetically modified organism / Molecular biology

Science and Security: Emerging Tensions

Add to Reading List

Source URL: www.princeton.edu

Language: English - Date: 2011-01-28 11:09:34
805Abstract data types / Electronic engineering / Stack / Computational complexity theory / Circuit / Electronic circuit / Secure multi-party computation / Boolean circuit / Lookup table / Computing / Theoretical computer science / Electronics

2013 IEEE Symposium on Security and Privacy Circuit Structures for Improving Efficiency of Security and Privacy Tools Samee Zahur and David Evans University of Virginia [samee, evans]@virginia.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:51
806Software / Social engineering / BitDefender / Trojan horse / Conficker / Rootkit / Rogue security software / Phishing / BitDefender safego / Malware / Antivirus software / System software

E-Threats Landscape Report Disclaimer The information and data asserted in this document represent the current ® opinon of BitDefender on the topics addressed as of the date of publication.

Add to Reading List

Source URL: www.bitdefender.com

Language: English - Date: 2011-08-05 07:48:57
807Electronic engineering / Network access / Wireless LAN / Telecommunications engineering / Wireless access point / Computer network security / Wi-Fi Direct / Canon EOS 30D / Wireless networking / Wi-Fi / Technology

Y P O EOS 70D (W) Wi-Fi Function

Add to Reading List

Source URL: gdlp01.c-wss.com

Language: English - Date: 2013-09-24 14:31:18
808Automation / HVAC / Engineering / Technology / Building engineering / Home automation / Thermostat

Domoalert: All your home security in one device Presskit Domoalert is the new home automation system which, by means of an electronic device designed by Alegre Industrial Studio, connects a smartphone to your house,

Add to Reading List

Source URL: www.alegredesign.es

Language: English - Date: 2015-01-12 04:32:07
809Genetic engineering / Agronomy / Crops / Hydrocarbons / Vitamins / Biofortification / Genetically modified food / Golden rice / Food security / Biology / Agriculture / Food and drink

GeneWatch UK response to: Biological approaches to enhance food-crop production: a call for evidence by the Royal Society October 2008

Add to Reading List

Source URL: genewatch.org

Language: English - Date: 2009-10-20 06:18:55
810Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
UPDATE