and Security

Results: 171768



#Item
141

Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2013-11-20 11:50:22
    142

    Activity Overview Arms Control Symposium ‘Future Challenges and Developments in Arms Control and PSSM domain’ CSE-A1-CF-18 RACVIAC - Centre for Security Cooperation, Rakitje, Stari hrast 53, HRBestovje, CROATI

    Add to Reading List

    Source URL: www.racviac.org

    Language: English - Date: 2018-05-09 08:55:15
      143

      Security Configuration Assessment (SCA) Getting Started Guide Security Configuration Assessment (SCA) is a lightweight cloud service which can quickly perform the configuration assessment of the IT assets, and centrally

      Add to Reading List

      Source URL: www.qualys.com

      Language: English - Date: 2017-10-17 19:22:36
        144

        Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N

        Add to Reading List

        Source URL: ceres.hh.se

        Language: English - Date: 2015-05-16 14:56:14
          145

          Virginia Tech Department of Computer Science Postdoctoral researcher Seek one or two postdoctoral researchers who are interested in the use of system engineering and data analytics to ensure system and software security.

          Add to Reading List

          Source URL: people.cs.vt.edu

          Language: English - Date: 2017-06-29 15:14:44
            146Immigration to the United States / Expedited removal / Immigration by country / Removal proceedings / Credible fear / Nationality / Immigration / Reinstatement of removal / Title 8 of the United States Code / Lawful permanent residents / Operation Streamline / Stipulated removal

            PRACTICE ADVISORY1 February 20, 2017 EXPEDITED REMOVAL: WHAT HAS CHANGED SINCE EXECUTIVE ORDER NO, BORDER SECURITY AND IMMIGRATION ENFORCEMENT IMPROVEMENTS (ISSUED ON JANUARY 25, 2017)

            Add to Reading List

            Source URL: nationalimmigrationproject.org

            Language: English
            147

            Security guidelines for field research in complex, remote and hazardous places Dorothea Hilhorst

            Add to Reading List

            Source URL: www.medewerkers.universiteitleiden.nl

            Language: English - Date: 2017-05-03 08:54:18
              148

              International Society for Labour and Social Security Law Société internationale de droit du travail et de la sécurité sociale Sociedad Internacional de Derecho del Trabajo y de la Seguridad Social

              Add to Reading List

              Source URL: www.afdt-asso.fr

              Language: French - Date: 2013-02-12 18:06:19
                149

                Navigating our clients on the path to Compliance and Certification INFORMATION NAVIGATORS offers Security & Compliance consulting services to organizations seeking compliance with standards such as ISO 27001, HIPAA and/

                Add to Reading List

                Source URL: www.informationnavigators.com

                Language: English - Date: 2017-03-20 14:42:31
                  150

                  Information, Communication & Cyber Security Technology Newsletter EPRI Update on ICT Research from the Cyber Security and IntelliGrid Programs and Related Demonstrations About the Newsletter This newsletter provides a pe

                  Add to Reading List

                  Source URL: smartgrid.epri.com

                  Language: English - Date: 2018-04-23 15:23:30
                    UPDATE