Beyond Security

Results: 583



#Item
41NPower / Security / Computer security / Computing / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Symantec

For Immediate Release Contact: Matt Sudol Phone: Email: NPower + Symantec Expand Free Cyber Training Program Beyond Young Adults to Serve Veterans

Add to Reading List

Source URL: www.npower.org

Language: English - Date: 2015-06-09 14:25:59
42

Satisfiability Modulo Theories : Beyond Decision Procedures Andrew Reynolds May 20, 2015 SMT Solvers for Software Verification/Security

Add to Reading List

Source URL: lara.epfl.ch

Language: English - Date: 2015-06-01 06:41:45
    43

    Honey Encryption Beyond Message Recovery Security ∗ Joseph Jaeger† Thomas Ristenpart‡ Qiang Tang§

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-02-23 03:13:51
      44Cloud clients / Humancomputer interaction / User interface techniques / Smartphones / Mobile app / Android / Mobile security / Wizard of Oz experiment

      Smartphone Text Entry in Cross-Application Tasks for the Workshop on Inviscid Text Entry and Beyond Toby Jia-Jun Li Abstract

      Add to Reading List

      Source URL: www.toby.li

      Language: English - Date: 2016-02-05 17:00:13
      45Sustainment Brigade / United States Army / Principles of sustainment / Military / National security of the United States / 16th Sustainment Brigade

      COMBINED ARMS SUPPORT COMMAND Army 2020 and Beyond Sustainment White Paper 30 August 2013

      Add to Reading List

      Source URL: www.cascom.army.mil

      Language: English - Date: 2013-10-23 15:00:39
      46

      Beyond Security AVDS Datasheet

      Add to Reading List

      Source URL: www.sekureit.net

      Language: English - Date: 2014-07-27 12:59:34
        47

        THE INVISIBLE BECOMES VISIBLE Trend Micro Security Predictions for 2015 and Beyond A TrendLabsSM Report

        Add to Reading List

        Source URL: www.trendmicro.co.uk

        Language: English - Date: 2014-11-03 08:39:29
          48

          Beyond Security AVDS Datasheet

          Add to Reading List

          Source URL: www.sekureit.net

          Language: English - Date: 2014-07-27 12:58:03
            49

            FREQUENTLY ASKED QUESTIONS PCI 1.X EXPERIENCE AND BEYOND WHY IS THE PCI SECURITY STANDARDS COUNCIL

            Add to Reading List

            Source URL: lp.verifone.com

            Language: English - Date: 2015-05-27 13:12:28
              50

              Institute for Cyber Security Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security

              Add to Reading List

              Source URL: profsandhu.com

              Language: English - Date: 2014-11-10 11:00:24
                UPDATE