and Security

Results: 171768



#Item
941

Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 14 PVLR 1164, Copyright 姝 2015 by The Bureau of National Affairs, Inchttp://www.bna.com

Add to Reading List

Source URL: www.wsgr.com

- Date: 2015-06-30 16:03:06
    942

    DFARS/FAR 101 Cyber Security in Business Language What you need to know, why you need to care, and what you need to do

    Add to Reading List

    Source URL: www.aia-aerospace.org

    - Date: 2017-12-22 09:46:04
      943

      SAFETY-CRITICAL VERSUS SECURITY-CRITICAL SOFTWARE Findings in this area from research work with leading Professionals and Academics and in conjunction with BCS, Resource Engineering Projects and SCSC Dr Adele-Louise Car

      Add to Reading List

      Source URL: www.bcs.org

      - Date: 2011-01-10 14:17:18
        944

        Research Brief, OctoberRegional Supply Chains and the Food Economy of Malawi Expanding Livelihood Opportunities and Enhancing Food Security Stephanie A. White,1 Jessica Kampanje-Phiri,2 Michael W. Hamm,1 Kurt Rich

        Add to Reading List

        Source URL: gcfsi.isp.msu.edu

        - Date: 2017-10-19 11:39:03
          945

          Efficient Doubling on Genus Two Curves over Binary Fields Tanja Lange1, and Marc Stevens2, 1 Institute for Information Security and Cryptology (ITSC), Ruhr-Universit¨

          Add to Reading List

          Source URL: marc-stevens.nl

          - Date: 2017-08-13 07:48:58
            946

            w w w . c r y s y s . h u Introducing the CrySyS Lab Levente Buttyán, PhD Laboratory of Cryptography and Systems Security Department of Networked Systems and Services

            Add to Reading List

            Source URL: www.crysys.hu

            - Date: 2018-01-31 02:12:17
              947

              DC3 PARIS Smart datacenter offering high standards for reliability, power, cooling and security controls. DC3 meets the requirements for large cloud

              Add to Reading List

              Source URL: www.iliad-datacenter.com

              - Date: 2018-01-12 05:32:21
                948

                A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized, and backed up d

                Add to Reading List

                Source URL: edgesecure.co

                - Date: 2018-02-27 15:24:39
                  949

                  Use ITAM to track and maintain hardware and software assets through their entire lifecycle, reclaim unused licenses, support security efforts, manage vendors and contracts, and cut costs up to 50%.9

                  Add to Reading List

                  Source URL: rs.ivanti.com

                  - Date: 2017-11-03 12:53:21
                    950

                    Stanford University Department of Public Safety Community Police Academy 2018Syllabus The Stanford University Department of Public Safety (SUDPS) has a long history of providing a variety of safety, security, and law enf

                    Add to Reading List

                    Source URL: police.stanford.edu

                    - Date: 2017-10-17 17:10:58
                      UPDATE