The Security Institute

Results: 5633



#Item
221

TESTIMONY OF DR. GAL LUFT EXECUTIVE DIRECTOR, INSTITUTE FOR THE ANALYSIS OF GLOBAL SECURITY (IAGS) COMMITTEE ON SCIENCE UNITED STATES HOUSE OF REPRESENTATIVES FEBRUARY 9, 2005

Add to Reading List

Source URL: www.iags.org

Language: English - Date: 2006-04-26 09:01:23
    222

    GUJARAT FORENSIC SCIENCES UNIVERSITY INSTITUTE OF FORENSIC SCIENCE M.TECH. CYBER SECURITY AND INCIDENT RESPONSE (SEM - II) RESULTS OF THE EXAMINATION HELD IN MAYREVISED) REGISTRATION NO.

    Add to Reading List

    Source URL: www.gfsu.edu.in

      223Computer security / Security / Insider threat / Salvatore J. Stolfo / Insider / Institute for Information Infrastructure Protection / Threat / Cyber Insider Threat / Insider trading

      Guest Editors’ Introduction Addressing the Insider Threat A

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35
      224Computing / Cryptography / Network architecture / IPsec / Cryptographic protocols / Computer network security / Virtual private networks / Cryptographic software / StrongSwan / Internet Key Exchange / Opportunistic encryption / NAT traversal

      Advanced Features of Linux strongSwan the OpenSource VPN Solution Institute of Internet Technologies and Applications Hochschule für Technik Rapperswil, Schweiz The powerful advanced features of the Linux strongSwan VPN

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2006-04-27 10:23:08
      225

      Special PublicationDRAFT Cloud Computing Synopsis and Recommendations Recommendations of the National Institute

      Add to Reading List

      Source URL: www.security-finder.ch

      Language: English - Date: 2012-06-25 03:01:06
        226

        Long Distance Relay Attack Luigi Sportiello Joint Research Centre Institute for the Protection and the Security of the Citizen

        Add to Reading List

        Source URL: rfidsec2013.iaik.tugraz.at

        Language: English - Date: 2013-08-02 05:37:17
          227Law enforcement / National security / Crime prevention / Law enforcement in the United States / Misconduct / Police misconduct / Police brutality / Problem-oriented policing / Community policing / New Orleans Police Department / CompStat / Hong Kong Police Force

          U.S. Department of Justice Office of Justice Programs National Institute of Justice National Institute of Justice R

          Add to Reading List

          Source URL: www.ncjrs.gov

          Language: English - Date: 2005-02-11 14:13:37
          228

          The Gap Between Promise and Reality: On the Insecurity of XOR Arbiter PUFs Georg T. Becker Horst Görtz Institute for IT-Security, Ruhr Universität Bochum, Germany Abstract. In this paper we demonstrate the first real-

          Add to Reading List

          Source URL: www.emsec.rub.de

          Language: English - Date: 2015-06-17 16:30:38
            229

            Jekyll on iOS: When Benign Apps Become Evil Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee, Georgia Institute of Technology This paper is included in the Proceedings of the 22nd USENIX Security Symposium.

            Add to Reading List

            Source URL: wenke.gtisc.gatech.edu

            Language: English - Date: 2013-09-30 15:25:17
              230Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

              WWW.SMARTSIMPLE.COMThe Marine Institute of Ireland About The Marine Institute of Ireland

              Add to Reading List

              Source URL: www.smartsimple.com

              Language: English - Date: 2015-10-14 09:52:58
              UPDATE