Security paper

Results: 6621



#Item
991Computing / FireEye /  Inc. / Multi-agent systems / Spamming / Malware / Botnet / Cyberwarfare / Computer network security / Computer security / Antivirus software

WHITE PAPER FIREEYE ADVANCED THREAT REPORT : 1H 2011 How advanced attacks succeed, despite $20B spent

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 18:12:03
992Collaboration / Human-based computation / World Wide Web / Amazon Mechanical Turk / Web 2.0 / CAPTCHA / Computer security / Information extraction / Social information processing / Crowdsourcing / Computing

SIGCHI Conference Paper Format

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-10-25 13:05:10
993Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
994Crime prevention / Mass surveillance / Privacy of telecommunications / Law enforcement / National Security Agency / Surveillance / Foreign Intelligence Surveillance Act / Computer security / Cloud computing / National security / Security / Public safety

July 2014 New America’s Open Technology Institute Policy Paper Surveillance Costs:

Add to Reading List

Source URL: www.newamerica.org

Language: English - Date: 2015-02-10 12:49:49
995Payment systems / CyberSource / Internet fraud / Authorize.Net / Payment gateway / Credit card / Address Verification System / Card security code / Bank card number / Electronic commerce / Merchant services / Business

White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant can afford

Add to Reading List

Source URL: www.authorize.net

Language: English - Date: 2012-07-13 17:54:37
996Political geography / Responsibility to protect / War in Darfur / Sudan / Omar al-Bashir / United Nations Security Council Resolution / Darfur / Minni Minnawi / CIA activities in Sudan / Darfur conflict / International relations / Africa

OCCASIONAL PAPER NO 67 China in Africa Project S e p t e m b e rThe Chinese Stance on the Darfur Conflict

Add to Reading List

Source URL: saiia.org.za

Language: English - Date: 2012-11-19 13:10:44
997Economics of global warming / Effects of global warming / European Union / Adaptation to global warming / Effects of climate change on humans / Climate change / Environment / Climate change policy

S113March 2008 CLIMATE CHANGE AND INTERNATIONAL SECURITY Paper from the High Representative and the European Commission to the European Council

Add to Reading List

Source URL: www.consilium.europa.eu

Language: English - Date: 2008-03-14 07:38:58
998Security / Financial capital / Beer / Preferred stock / Capital structure / Beer in Scotland / Mohan Meakin Brewery / Economics / Canadian Breweries Limited / Stock market / Corporate finance / Beer and breweries by region

QUCEH WORKING PAPER SERIES http://www.quceh.org.uk/working-papers HAPPY HOUR FOLLOWED BY HANGOVER: FINANCING THE UK BREWERY INDUSTRY, Graeme G. Acheson (University of Stirling)

Add to Reading List

Source URL: www.quceh.org.uk

Language: English - Date: 2015-03-07 10:35:05
999HTTP / Inter-process communication / Server Message Block / URL redirection / DNS spoofing / Shared resource / Man-in-the-middle attack / HTTP Secure / Computing / Network file systems / Computer network security

REDIRECT TO SMB REDIRECT TO SMB A CYLANCE SPEAR TEAM WHITE PAPER Lead Researcher: Brian Wallace // @botnet_hunter

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-04-13 03:55:39
1000Security / Computer security / Voting system / Voting machine / Vulnerability / Malware / Premier Election Solutions / Voter-verified paper audit trail / Politics / Electronic voting / Information society

Inside Risks Matt Bishop and David Wagner Risks of E-voting lectronic voting has spread throughout the

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
UPDATE