Security engineering

Results: 11317



#Item
81Emergency management / Firefighting in the United States / Disaster preparedness / United States Department of Homeland Security / Incident management / National Response Framework / Incident Command System / Federal Emergency Management Agency / Crisis communication / Emergency management software

PUBLIC INFORMATION IN AN ALL-HAZARDS INCIDENT MGT -318 Texas A&M Engineering Extension Service National Emergency Response and Rescue Training Center

Add to Reading List

Source URL: www.scemd.org

Language: English - Date: 2016-05-04 08:14:26
82Computer security / Safety / Prevention / Risk / Security / Data security / Reliability engineering / Risk assessment / Safety engineering / Threat / IT risk management / Integrity Management Plan

d - Integrity Management Tools_ RiskCalculator_front [Converted].ai

Add to Reading List

Source URL: www.sewall.com

Language: English - Date: 2015-11-23 13:48:44
83Computing / Telecommunications engineering / Data management / Fibre Channel / Internet Fibre Channel Protocol / ISCSI / Storage area network / XAM / Backup / Storage security / Software-defined storage

STORAGE NETWORKING CONCEPTS FOUNDATION Building a Working Knowledge of Storage Networking through a clear understanding of Solutions & Technology For professionals who require a comprehensive

Add to Reading List

Source URL: www.snia-sa.org

Language: English - Date: 2010-10-20 15:16:22
84Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:36
85Software / Computer security / System software / Antivirus software / ESET / Malware / Computer virus / Avira / ESET NOD32

ESET® CASE STUDY Mercury Engineering “The biggest thing that stands out is its strong technical advantage over other products in the marketplace. ESET offers us reliable security, meaning that I can work on any proj

Add to Reading List

Source URL: cdn2-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:29
86Usability / User interfaces / Humancomputer interaction / Technical communication / User Research / User experience / System usability scale / Usability engineering / Usability of web authentication systems

Recommendations for a Graduate Seminar in Usable Security Kent Seamons Internet Security Research Lab Brigham Young University Provo, Utah, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:04
87Computing / Cryptography / Computer architecture / Computer network security / Shellcode / Data structure alignment / X86 / Kerberos / Transmission Control Protocol

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
88Electromagnetism / Engineering / Electronic engineering / Electronics manufacturing / Electronic design / Emotions / Hope / Positive mental attitude / Security hacker / Hackers: Heroes of the Computer Revolution / Hacker culture / Printed circuit board

Aal al Beit street, Damascus, Syria. Last day of the presidential election, where there is only one candidate: Bashar al-Assad. Me and Isaam are walking along the crowded sidewalk. We stop at a small kiosk. While standin

Add to Reading List

Source URL: carljohanrosen.com

Language: English - Date: 2014-11-01 13:18:52
89Fraud / Spamming / Crime / Deception / Social engineering / Confidence tricks / Identity theft / Phishing / Email fraud / Online banking / Email / Short Message Service

Security Alert At AmBank, we are always concerned about your online banking safety. Kindly be reminded to take necessary precautions in safekeeping your computers and mobile devices from malwares, viruses and trojans. On

Add to Reading List

Source URL: community.truebyambank.com

Language: English - Date: 2014-12-14 20:24:03
90Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

Microsoft Word - review18.doc

Add to Reading List

Source URL: www.jot.fm

Language: English - Date: 2007-08-10 10:58:07
UPDATE