Security paper

Results: 6621



#Item
421Food and drink / Africa / Poverty / Population / Food security / Famine / Sub-Saharan Africa / Ethiopia / Malnutrition / Development / Food politics / Humanitarian aid

Chinese Investment in Sub-Saharan Africa: Food Security Implications Matthew Smith1 This paper is produced for the Food We Want2 project.

Add to Reading List

Source URL: www.foodwewant.org

Language: English - Date: 2015-07-19 04:31:54
422Microkernel / Capability-based security / Domain / Key / Windows key / Kernel / Function key / EROS / Memory protection / Computer architecture / Security / KeyKOS

The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

Add to Reading List

Source URL: www.cap-lore.com

Language: English - Date: 2009-05-04 18:57:36
423

EURELECTRIC’s response to the European Commission’s consultation on revision of Regulation (EU) Noconcerning measures to safeguard security of gas supply A EURELECTRIC response paper

Add to Reading List

Source URL: www.eurelectric.org

Language: English - Date: 2015-05-13 09:11:58
    424Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

    The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2002-04-30 18:05:07
    425

    An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-07-21 08:57:56
      426

      Teaching Computer Security Matt Bishop Department of Mathematics and Computer Science, Dartmouth College, 6188 Bradley Hall, Hanover, NHAbstract This paper describes three courses in computer security, and of

      Add to Reading List

      Source URL: seclab.cs.ucdavis.edu

      Language: English - Date: 2004-06-21 18:55:42
        427Cryptographic protocols / Internet standards / Secure communication / Keystore / HTTP Secure / X.509 / Self-signed certificate / Public key certificate / Transport Layer Security / Cryptography / Public-key cryptography / Key management

        Lexmark International Markvision Enterprise SSL Configuration White Paper June 2015

        Add to Reading List

        Source URL: www.lexmark.com

        Language: English - Date: 2015-07-17 20:29:14
        428National security / Islamism / Religion / Al-Qaeda / American Muslims / Moazzam Begg / Cageprisoners / Inspire / War on Terror / Islam / Islamic terrorism / Anwar al-Awlaki

        Understanding CAGE: A Public Information Dossier An Examination of Ideology, Campaigns and Support Network Centre for the Response to Radicalisation and Terrorism Policy Paper No)

        Add to Reading List

        Source URL: henryjacksonsociety.org

        Language: English - Date: 2015-04-10 05:31:40
        429

        Paper Title (use style: paper title)

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2015-05-11 16:42:26
          430Development / Business law / Foreign direct investment / International business / Macroeconomics / Leasehold estate / Leasing / Food security / Land grabbing / Economics / Business / Law

          FOREIGN DIRECT INVESTMENT IN AGRICULTURE AND LAND LEASE CONTRACTING: A CRITICAL EVALUATION OF LEASE CONTRACTS IN EASTERN AFRICA Paper presented during THE REGIONAL CONFERENCE ON FOREIGN DIRECT

          Add to Reading List

          Source URL: www.fes-kenya.org

          Language: English - Date: 2012-09-19 07:51:31
          UPDATE