Security

Results: 374843



#Item
701

Comments of THE ELECTRONIC PRIVACY INFORMATION CENTER (EPIC) to THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE, DEPARTMENT OF DEFENSE [Docket ID: DoD-2015-OS-0100]

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2016-02-22 14:56:38
    702

    Building resilient ICS Cyber Security Architectures for critical infrastructure Event and/or the presenter´s name, title (optional) Max on 2 rows

    Add to Reading List

    Source URL: automationinstrumentationsummit.files.wordpress.com

    Language: English - Date: 2017-09-05 05:08:12
      703

      The Coalition for Water Security

      Add to Reading List

      Source URL: www.coalitionforwatersecurity.org

      Language: English - Date: 2011-05-11 18:56:57
        704

        MPKC C ∗ Family Analysis An Updated Security Analysis of PFLASH Ryann Cartor1 & Daniel Smith-Tone1,2

        Add to Reading List

        Source URL: 2017.pqcrypto.org

        Language: English - Date: 2017-06-28 17:05:02
          705

          Terms of Reference for the Transport Resilience and Security Expert Group (TRANSSEC) Terms of Reference for the Transport Resilience and Security Expert Group (TRANSSEC) ENISA launches this Call for Participation to inv

          Add to Reading List

          Source URL: resilience.enisa.europa.eu

          Language: English - Date: 2018-03-07 05:05:57
            706

            REGISTRO INFRACTORES LEYRESPONSABLE ADT SECURITY SERVICES SA ADT SECURITY SERVICES SA ACE SEGUROS S.A. (GRUPO ACE)

            Add to Reading List

            Source URL: www.argentina.gob.ar

            Language: Portuguese - Date: 2018-01-31 11:36:45
              707

              Office of External Affairs U.S. Department of Homeland Security 500 C Street, SW Washington, DCTalking Points

              Add to Reading List

              Source URL: apd.myflorida.com

              Language: English - Date: 2017-09-17 13:18:51
                708

                Automatic source code transformations for strengthening practical security of smart card applications ˇ Vaˇ sek Lorenc, Tobi´ aˇ

                Add to Reading List

                Source URL: crocs.fi.muni.cz

                Language: English - Date: 2014-09-21 19:02:54
                  709

                  Impossibility of Precise and Sound Termination Sensitive Security Enforcements Anonymous Author(s) Abstract—An information flow policy is termination sensitive if it imposes that the termination behavior of programs is

                  Add to Reading List

                  Source URL: www-sop.inria.fr

                  Language: English - Date: 2018-03-27 09:23:29
                    710

                    /********************************************************************** CertAgent® Command Line Interface (CACLI) Version: 1.0.0 Date: 21 June 2005 Authors: Jonathan Schulze-Hewett Copyright ©2005 Information Security

                    Add to Reading List

                    Source URL: www.infoseccorp.com.

                    Language: English - Date: 2018-01-16 08:16:27
                      UPDATE