First Page | Document Content | |
---|---|---|
![]() Date: 2010-03-09 17:35:23National security Defence in depth Military geography Military strategy Proactivity Security through obscurity SecurID Attack Force concentration Military science Security Computer network security | Add to Reading List |
![]() | Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. HongDocID: 1tVZ5 - View Document |
![]() | Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. HongDocID: 1t7cA - View Document |
![]() | BLACKHAT USA 2006 – Dynamics of Insecurity The speed of (in)security Analysis of the speed of security vs insecurity BlackHat 2006 USA – Las Vegas Stefan Frei + Martin MayDocID: 15z88 - View Document |
![]() | A Learning-Based Approach to Reactive SecurityDocID: 14PTM - View Document |
![]() | Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & SocietyDocID: 132Zz - View Document |