Security paper

Results: 6621



#Item
371

APPENDIX A: GLOSSARY Italicized terms within definitions are defined separately. ABCP see asset-backed commercial paper. ABS see asset-backed security. ABX.HE A series of derivatives indices constructed from the prices

Add to Reading List

Source URL: fcic-static.law.stanford.edu

Language: English - Date: 2011-03-11 14:24:05
    372Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    373Nuclear warfare / International security / Nuclear Non-Proliferation Treaty / Nuclear proliferation / Nuclear disarmament / Disarmament / International Court of Justice advisory opinion on the Legality of the Threat or Use of Nuclear Weapons / Anti-nuclear movement / Nuclear weapons / International relations / Arms control

    NAPF Briefing Paper for the 2014 NPT PrepCom

    Add to Reading List

    Source URL: www.wagingpeace.org

    Language: English - Date: 2015-03-06 17:34:34
    374Data security / Computer network security / Threat / Vulnerability / Information security / Network security / Software Engineering Institute / Security information and event management / Cyber Insider Threat / Computer security / Cyberwarfare / Security

    WHITE PAPER Securing the Modern Enterprise “Factory:” How to Build an Insider Threat Program. This whitepaper explores the kinds of internal users who are most

    Add to Reading List

    Source URL: www.raytheoncyber.com

    Language: English - Date: 2015-07-20 11:10:08
    375System software / Crime prevention / National security / Password / Data security / Identity management / Information security / One-time password / Self-service password reset / Security / Computer security / Identity management systems

    White Paper ENTERPRISE www.novell.com Enabling Retail Banks to

    Add to Reading List

    Source URL: www.tentonmarketing.com

    Language: English - Date: 2014-12-17 12:32:00
    376Animal rights / Meat industry / Organic farming / Agronomy / Intensive farming / Industrial agriculture / Livestock / Cattle feeding / Food systems / Agriculture / Land management / Environment

    THE FOOD SECURITY, SUSTAINABILITY, PUBLIC HEALTH AND ANIMAL WELFARE IMPLICATIONS OF LIVESTOCK PRODUCTION Position Paper by Compassion in World Farming, Humane Society International

    Add to Reading List

    Source URL: www.ciwf.org.uk

    Language: English - Date: 2014-11-24 11:04:57
    377Secure multi-party computation / Secure two-party computation / IP / Oblivious transfer / PP / Communications protocol / Communication complexity / RSA / Security parameter / Cryptography / Theoretical computer science / Cryptographic protocols

    An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-07-21 08:57:56
    378Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

    White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

    Add to Reading List

    Source URL: www.intel.es

    Language: English - Date: 2014-03-03 12:50:49
    379Entrepreneur / Unemployment / Economics / Occupational prestige / Employment / Job security / Occupational safety and health / Socioeconomics / Management / Entrepreneurship / Occupations

    Paper to be presented at the DRUID 2011 on INNOVATION, STRATEGY, and STRUCTURE Organizations, Institutions, Systems and Regions at Copenhagen Business School, Denmark, June 15-17, 2011

    Add to Reading List

    Source URL: druid8.sit.aau.dk

    Language: English - Date: 2011-05-31 08:39:10
    380

    Justice and Security Green Paper: Oral Evidence

    Add to Reading List

    Source URL: www.parliament.uk

    Language: English - Date: 2012-03-28 06:12:02
      UPDATE