Security engineering

Results: 11317



#Item
831Software bugs / C POSIX library / Computer errors / Stack buffer overflow / Buffer overflow / Write / Stack / Uncontrolled format string / Sizeof / Computing / Software engineering / Computer programming

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-11 05:02:06
832Usability / Technology / Audit / Systems engineering process / Data security / Business / IT risk management / Defence Science and Technology Agency / Information technology management / Human–computer interaction / Technical communication

Microsoft Word - NPOKI Consuting Services_11_Final _2_.doc

Add to Reading List

Source URL: www.npoki.org

Language: English - Date: 2009-12-21 17:56:42
833Agronomy / Organic farming / Organic gardening / Genetic engineering / Agroecology / Food security / .gm / Genetically modified food / Farm / Environment / Agriculture / Land management

Andrew George MP House of Commons London SW1A 0AA By email to 18 June 2014

Add to Reading List

Source URL: www.gmfreeze.org

Language: English - Date: 2014-06-19 05:14:43
834Electronic engineering / Wireless / Radio technology / Television technology / Ultra high frequency / Very high frequency / High frequency / Amateur radio / Citizens Band radio / Telecommunications engineering / Radio spectrum / Technology

Auxiliary Communications Field Operations Guide (AUXFOG) US Department of Homeland Security Office of Emergency Communications

Add to Reading List

Source URL: files.w1mwv.com

Language: English - Date: 2014-03-19 09:50:56
835Electronic engineering / Mobile telecommunications / Logical Link Control / SMS / Wireless modem / Subscriber identity module / Hayes command set / Mobile phone / Information security management system / Technology / Mobile technology / Modems

SMSFinder User Guide for SF100, SF400, SF800 models

Add to Reading List

Source URL: downloads.inlogic.dk

Language: English - Date: 2013-02-21 03:40:56
836Cradle-to-cradle design / Security engineering / Waste reduction / Stakeholder / C2c / Environment / Structure / Transport in the United Kingdom / Environmental social science / Corporate finance / Architecture

Communication Strategy Tool User Guide Author Dr Nii A. Ankrah Co-author Dr Emmanuel Manu Date November 2014

Add to Reading List

Source URL: www.c2cbizz.com

Language: English - Date: 2015-02-20 08:20:05
837Global Monitoring for Environment and Security / Microelectromechanical systems / Technology / Physics / Engineering / Space policy of the European Union / Microtechnology / European Space Agency

2_Expertise_Profile_GMES_INSITU_CC_SSF_AMG_Technology_Bulgaria

Add to Reading List

Source URL: gmes-bg.org

Language: English - Date: 2011-04-07 03:57:42
838Privacy / Internet privacy / Carrier cloud / Ethics / Computing / Cloud computing

Scientist’s perspective on security and privacy Andris Ambainis University of Latvia Software engineering is about ensuring that

Add to Reading List

Source URL: www.parleu2015.lv

Language: English - Date: 2015-04-21 01:54:54
839Webroot Software / Antivirus software / Software / Computing / System software / Malware / Webroot Internet Security Essentials / Webroot Internet Security Complete / Phishing / Social engineering / Spamming

FOR TECHNOLOGY PARTNERS BrightCloud Real-Time Anti-Phishing Service ® OVERVIEW

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2015-04-13 13:56:27
840Doors / Locks / Door furniture / Access control / Door / Electromagnetic lock / Revolving door / Sliding door / DORMA / Gates / Security engineering / Security

Total Security Solutions With Horton Automatics, you don’t have to sacrifice accessibility for safety. We are the leader in secure access solutions. SOLUTIONS

Add to Reading List

Source URL: edsdoors.com

Language: English - Date: 2010-03-30 22:23:03
UPDATE