Security paper

Results: 6621



#Item
651Problem solving / Vulnerability / Nash equilibrium / Zero-day attack / Social vulnerability / Extensive-form game / United States Cyber Command / Sequential equilibrium / Solution concept / Game theory / Cyberwarfare / Computer security

Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems [Position Paper] Tyler Moore, Allan Friedman and Ariel D. Procaccia Center for Research on Computation & Soci

Add to Reading List

Source URL: www.nspw.org

Language: English - Date: 2011-04-20 15:15:37
652Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
653Medicine / Humanitarian aid / Food politics / Public health / Nevin S. Scrimshaw / Gro Harlem Brundtland / Global health / Malnutrition / Food security / Health / Nutrition / Food and drink

Challenges for the 21st Century: A Gender Perspective on Nutrition through the Life Cycle − Nutrition policy paper No. 17 Table of Contents Challenges for the 21st Century: A Gender Perspective on Nutrition through t

Add to Reading List

Source URL: www.unscn.org

Language: English - Date: 2009-07-21 03:32:33
654Environmental social science / Environmental economics / Sustainable architecture / Sustainable building / Sustainable development / Food security / Green economy / World Business Council for Sustainable Development / International development / Environment / Sustainability / Earth

Microsoft Word - Nexus EGM-Working Paper-20Feb15-CCC

Add to Reading List

Source URL: css.escwa.org.lb

Language: English - Date: 2015-03-11 08:19:29
655Security / Cyberwarfare / Voluntary Voting System Guidelines / Electronic voting / Voting machine / Voter-verified paper audit trail / Threat / Access control / Voting system / Computer security / Election technology / Politics

Security Requirements Table of Contents2

Add to Reading List

Source URL: votingintegrity.org

Language: English - Date: 2007-09-27 15:46:01
656IPv6 / Network protocols / Tunneling protocols / Computer network security / 6to4 / IPsec / Mobile IP / IPv4 / Tunnel broker / Internet Protocol / Network architecture / Internet

North American IPv6 Task Force (NAv6TF) Technology Report “IPv6 Security Technology Paper” Version 1.0 July 22, 2006 Primary Author/Editor: Merike Kaeo Contributing Authors: David Green,

Add to Reading List

Source URL: www.ipv6forum.com

Language: English - Date: 2006-07-23 08:10:17
657Data security / Concurrent computing / Privacy / Health Insurance Portability and Accountability Act / Paper shredder / Backup / Shred / Information privacy / Data center / Computing / Data management / Security

DATA BYTE Captricity for Enterprise Data Privacy, Security & Disaster Recovery Overview Secure, HIPAA-compliant enterprise data transformation is our specialty at Captricity. We realize the sensitive nature of your busi

Add to Reading List

Source URL: captricity.com

Language: English - Date: 2015-03-10 12:28:25
658Programming language implementation / VM / Insider / Zoning / Multilevel security / System software / Software / Virtual machines

Limiting Insider Effects Through Micro-Zoning Fred Cohen – CEO – Management Analytics Abstract—This paper focuses on the use of micro-zoning to limit the effects of insider acts. Background is provided on component

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-08-02 22:42:50
659Credit cards / Electronic commerce / Computer security / Security / Payment Card Industry Data Security Standard / Tokenization / Payment card industry / Qualified Security Assessor / Cloud computing security / Data privacy / Payment systems / Computing

Engine Yard White Paper Platform as a Service and PCI www.engineyard.com

Add to Reading List

Source URL: www.engineyard.com

Language: English - Date: 2015-05-21 12:57:26
660Computer network security / Network management / Antivirus software / Data security / Paessler / System administration / Malware / PRTG Network Monitor / Firewall / System software / Microsoft Windows / Computing

WHITE PAPER Network Monitoring as an essential component of IT security White Paper

Add to Reading List

Source URL: assets.paessler.com

Language: English - Date: 2015-05-26 04:10:09
UPDATE