Security engineering

Results: 11317



#Item
941Safety engineering / Occupational safety and health / Industrial hygiene / Occupational Safety and Health Administration / COSHH / Personal Protective Equipment at Work Regulations / Safety / Prevention / Security

“Federal Regulations on Safety and Health at Work” On November 13, 2014, the Labor Ministry published in the Official Daily Gazette, the Federal Regulations on Safety and Health at Work. The purpose of these Federal

Add to Reading List

Source URL: www.mirest.com

Language: English - Date: 2015-01-30 18:10:14
942Design / Enterprise modelling / Process management / Systems engineering / Information security / Learning management system / Public safety / Education / Security / Business process modeling

May 2015 Focus Newsletter - Draft - v7 0.pub

Add to Reading List

Source URL: www.fiscal.ca.gov

Language: English - Date: 2015-05-01 19:06:12
943Electronic engineering / VASCO Data Security International / Mobile telecommunications / One-time password / Provisioning / Vision Mobile Browser / Mobile phone / Security token / Digipass / Technology / Electronics

DIGIPASS DIGIPASS for Mobile Enterprise Security Edition Generate one-time passwords without additional hardware devices DIGIPASS® for Mobile Enterprise Security Edition is the easiest way to deploy strong authenticati

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:39
944Computing / Networking hardware / Electronic engineering / Computer network security / Content-control software / Fortinet / Power over Ethernet / IEEE 802.3 / Wireless access point / Ethernet / OSI protocols / IEEE standards

Gigabit PoE Injector PRODUCT DATASHEET Remote Power feeding made easy The single port GPI-115 Power over Ethernet (PoE) injector offers a compact and cost- effective, fully IEEE

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:32
945Occupational safety and health / Chemical engineering / Process safety management / United States Environmental Protection Agency / Audit / Emergency management / Safety / Prevention / Security

Microsoft PowerPoint - Zimmerman.pptx

Add to Reading List

Source URL: www.insafetyconf.com

Language: English - Date: 2015-05-04 15:24:02
946Technology / Antivirus software / Computer network security / Telecommunications engineering / Computing / Hacking / Southampton Open Wireless Network / Wireless networking / Service set / Eduroam

Revision date: February 9, 2015 Secure Network Campus Network

Add to Reading List

Source URL: its.uncg.edu

Language: English
947Deep packet inspection / Network architecture / Computer networking / Packet Processing / Mobile data offloading / Quality of service / Transmission Control Protocol / System Architecture Evolution / Deep content inspection / Computing / Computer network security / Electronic engineering

Application Datasheet Mobile Data Offloading Use Case Application awareness to enable data delivery with network technologies complementary to 3G/4G such as WiFi networks or femtocells.

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:07:49
948Received signal strength indication / Wireless / DBm / Bluetooth / ANT / Technology / Telecommunications engineering / IEEE 802.11

Mantis TM Bluetooth Security Sweeper

Add to Reading List

Source URL: www.bvsystems.com

Language: English - Date: 2013-06-06 16:43:06
949Bluetooth / Wireless / ANT / Transmission Control Protocol / IEEE 802.11 / BitTorrent protocol encryption / Universal Serial Bus / Communications protocol / Technology / Telecommunications engineering / Computing

Bluetooth: With Low Energy comes Low Security Mike Ryan iSEC Partners Abstract We discuss our tools and techniques to monitor and inject

Add to Reading List

Source URL: lacklustre.net

Language: English - Date: 2013-09-26 05:42:47
950Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
UPDATE