Computer security conference

Results: 514



#Item
251Security / OpenID / Windows CardSpace / Identity 2.0 / Information Card / Yadis / Identity management / Higgins project / Identity theft / Federated identity / Computer security / Identity

Alice Marwick New York University Identity and Identification Conference “Selling Your Self” : The Ethics of Identity 2.0

Add to Reading List

Source URL: www.tiara.org

Language: English - Date: 2007-02-27 11:56:26
252National security / Public safety / Data security / Information security / Identity management / Organisation for Economic Co-operation and Development / Application security / International Cybercrime / IT risk / Security / Computer security / Crime prevention

Microsoft PowerPoint - Lubckert - FINAL- ICT Security Conference Seoul distrib.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:45
253Data security / Information security / Public safety / Prevention / Black Hat Briefings / Security / Computer security

Subject: Request to Attend Black Hat USA Conference 2014 Dear [decision maker name], I’m writing to request your approval for me to attend the Black Hat USA Information Security Conference to be held August 2nd through

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
254Malware / Computer virus / Computer security / Norton Internet Security / Antivirus software / System software / Software

Testing of “Dynamic Detection” Maik Morgenstern, Andreas Marx AV-Test GmbH, Magdeburg, Germany http://www.av-test.org Presented at the AVAR 2007 Conference in Seoul, South Korea http://www.aavar.org/avar2007/index.ht

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
255Military technology / Cyberwarfare / Computer security / Advanced persistent threat / Psychological resilience / Hacking / Security / Electronic warfare

Andrew Gracie: Cyber resilience – a financial stability perspective Speech given by Mr Andrew Gracie, Executive Director of Resolution of the Bank of England, at the Cyber Defence and Network Security conference, Londo

Add to Reading List

Source URL: www.bis.org

Language: English - Date: 2015-01-29 02:42:00
256Computer network security / OWASP / Software testing / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Security

OWASP AppSec DC 2009 Conference Jeff Williams, OWASP Board Chair The OWASP Mission First I’d like to introduce the OWASP Board (Tom, Dave, Dinis,

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:21
257Computing / Security / OWASP / Software testing / Web application security / Application security / Application firewall / Cross-site request forgery / Vulnerability / Computer security / Cyberwarfare / Computer network security

OWASP AppSec Resarch 2013 Conference http://www.owasp.org/index.php/AppSecEU2013 WASC/OWASP WAFEC From industry to community project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-08-26 18:02:53
258Actuarial science / Emergency management / Risk / Risk management / Computer security / Thales / Volatility / 318th Information Operations Group / Security / Ethics / Management

www.thalesgroup.com Cyber Risk David Shaw, Principal Consultant – Cyber Security Thales Secure Communications and Information Systems Insurance Council of New Zealand Conference , November 2014

Add to Reading List

Source URL: icnz-staging.netco.nz.net

Language: English - Date: 2014-10-30 16:54:33
259Classes of computers / Ambient intelligence / Information appliances / Human–computer interaction / Personal digital assistants / Wearable computer / Smart Watch / Wearable technology / Cloud computing / Computing / Mobile computers / Technology

This paper appeared in Proc. 18th Intl. Conference on Financial Cryptography and Data Security, March[removed]For updates, visit https://jhalderm.com/papers. Outsmarting Proctors with Smartwatches: A Case Study on Wearable

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2014-12-24 15:14:39
260Computer security conference / Security guard / Chief security officer / Management / Public safety / Chief information security officer / Security / Black Hat Briefings

briefings & trainings M A N D A L AY B AY, L A S V E G A S , N V AUGUST 1- 6, 2015 B USINESS H ALL O PEN A UGUST5 - 6 sponsor prospectus

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2015-02-06 16:09:36
UPDATE