The Security Institute

Results: 5633



#Item
241Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:02
242Health / Food and drink / Personal life / Federal assistance in the United States / Food storage / Pantry / Rooms / Supplemental Nutrition Assistance Program / Food security / Hunger in the United States / Food bank / Hunger

INSTITUTE of PUBLIC POLICY Harry S Truman School of Public Affairs POLICY BRIEF Report

Add to Reading List

Source URL: foodsecurity.missouri.edu

Language: English - Date: 2013-02-07 18:40:04
243

The Political Origins of Social Security in Mexico during the Cárdenas and Ávila Camacho Administrations* Michelle Dion Georgia Institute of Technology

Add to Reading List

Source URL: michelledion.com

Language: English - Date: 2009-11-10 11:52:39
    244

    The Fall of a Tiny Star Flavio D. Garcia and Bart Jacobs Institute for Computing and Information Sciences, Digital Security Group, Radboud University Nijmegen. P.O. Box 9010, NL-6500 GL Nijmegen, The Netherlands. www.cs.

    Add to Reading List

    Source URL: www.proxmark.org

    Language: English - Date: 2012-08-10 18:30:54
      245Security / Law enforcement in the United States / Prevention / Safety / V-12 Navy College Training Program / Department of Public Safety / Rensselaer Polytechnic Institute / Clery Act / Public safety organizations / Dispatcher / 9-1-1 / Security guard

      Annual Security & Fire Safety Report 2015 2

      Add to Reading List

      Source URL: www.rpi.edu

      Language: English - Date: 2015-11-03 12:39:42
      246

      A National Security Education Program Initiative Administered by the Institute of International Education National Security Education Act • Authored by Senator David L. Boren

      Add to Reading List

      Source URL: www.borenawards.org

      Language: English
        247Security / Computing / MIT Media Lab / Massachusetts Institute of Technology / Data visualization / Computer security

        Connection Science and Engineering: What problems does network research need to solve? Industry Panel at Workshop on Information and Decision Science The world is moving to distributed, network systems for health, financ

        Add to Reading List

        Source URL: wids.lids.mit.edu

        Language: English - Date: 2012-11-21 08:33:49
        248

        VIRGINIA POLYTECHNIC INSTITUTE AND STATE UNIVERSITY 2012 JEANNE CLERY ACT REPORT THE ANNUAL CAMPUS SECURITY REPORT FOR THE

        Add to Reading List

        Source URL: www.police.vt.edu

        Language: English
          249

          APWS Bulletin Summary of the 2nd Asia-Pacific Water Summit (2nd APWS) - Water Security and Waterrelated Disaster Challenges: Leadership and Commitment Published by the International Institute for Sustainable Development

          Add to Reading List

          Source URL: www.iisd.ca

          Language: English - Date: 2013-05-22 20:58:32
            250

            VIRGINIA POLYTECHNIC INSTITUTE AND STATE UNIVERSITY 2012 JEANNE CLERY ACT REPORT THE ANNUAL CAMPUS SECURITY REPORT FOR THE

            Add to Reading List

            Source URL: www.police.vt.edu

            Language: English
              UPDATE