Computer security conference

Results: 514



#Item
201Poster / Knowledge / Human communication / Presentation / Microsoft PowerPoint / International Atomic Energy Agency / Academia / Software / Poster session

The International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange IAEA Headquarters, Vienna, Austria, 1–5 June[removed]Guidance for Enhanced Poster Presenters (E-Posters) The Internatio

Add to Reading List

Source URL: www-pub.iaea.org

Language: English - Date: 2015-03-17 06:56:31
202Public safety / Prevention / Phishing / Social engineering / Spamming / Security controls / Australasian Conference on Information Systems / Information security / Computer security / Data security / Security

Selected Publications Parsons, K., McCormac, A., Butavicius, M., Pattinson, M. & Jerram, C. (in press). Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAISQ). Computers & Se

Add to Reading List

Source URL: business.adelaide.edu.au

Language: English - Date: 2014-05-18 23:19:59
203National security / Crime / Law / International Cybercrime / Internet ethics / Law enforcement / Computer security / Surveillance / Digital rights management / Computer crimes / Security / Crime prevention

Australian High Tech Crime Conference Communications Law Centre University of Technology, Sydney 9-11 June[removed]Turning the Tables

Add to Reading List

Source URL: www.uts.edu.au

Language: English - Date: 2013-11-12 00:18:34
204Burnie /  Tasmania / Windows Live OneCare / Computer security / Software / System software / Evanston /  Illinois / Rotary International

[removed]OneCare Rotary District Conference Theme:- “NO Limits” Burnie[removed]March)

Add to Reading List

Source URL: rotary9830.org.au

Language: English - Date: 2015-03-18 07:33:56
205Transmission Control Protocol / Farstream / Denial-of-service attack / Computing / Free software / Software / Computer network security / Denial-of-service attacks

Source Address Validation Everywhere Paul Vixie, CEO Farsight Security[removed]

Add to Reading List

Source URL: conference.apnic.net

Language: English
206Ethernet / Network architecture / Virtual LAN / Computer network security / IEEE 802.1Q / Virtual network / Erlang / Network switch / Network-to-network interface / Computing / Local area networks / IEEE 802

IGALIA – SERVAL: an Internet Software VLAN switch developed in Erlang: EUC[removed]SERVAL: an Internet software VLAN switch developed in Erlang Erlang User Conference 2004 Juan José Sánchez Penas (LFCIA, Igalia)

Add to Reading List

Source URL: www.erlang.se

Language: English - Date: 2004-11-04 06:24:17
207Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 13:01:24
208Privacy of telecommunications / Computer law / Privacy / Crime prevention / Surveillance / Mass surveillance / Legal aspects of computing / Telecommunications data retention / Internet privacy / National security / Law / Ethics

Image: geralt Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 – Wednesday 19 November 2014 | WP1361

Add to Reading List

Source URL: www.wiltonpark.org.uk

Language: English - Date: 2015-01-14 05:27:48
209Criminology / Security / International Multilateral Partnership Against Cyber Threats / Computer security / Convention on Cybercrime / Cyberspace / Internet-related prefixes / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Crime / International Cybercrime

SPECIAL REPORT October 2013 A shared agenda for the Seoul Conference on Cyberspace South Korea, 2013

Add to Reading List

Source URL: www.aspi.org.au

Language: English - Date: 2013-11-12 17:30:41
210Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:52:30
UPDATE