Control system security

Results: 2384



#Item
951Microsoft Word - 0AdRule9[removed]Final[removed]doc

Microsoft Word - 0AdRule9[removed]Final[removed]doc

Add to Reading List

Source URL: www.seattle.gov

Language: English - Date: 2012-07-28 16:16:58
952Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
953escrypt GmbH  System Provider for Embedded Security  A Generic Architecture and Extension of eCryptfs:

escrypt GmbH System Provider for Embedded Security A Generic Architecture and Extension of eCryptfs:

Add to Reading List

Source URL: www.linux-kongress.org

Language: English - Date: 2009-10-30 06:39:24
954FreeBSD Developer Summit TrustedBSD: Audit + priv[removed]November 2006 Robert Watson FreeBSD Project Computer Laboratory

FreeBSD Developer Summit TrustedBSD: Audit + priv[removed]November 2006 Robert Watson FreeBSD Project Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-11-13 08:58:21
955Journal Online BMIS—An Introduction to the System Environment Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer

Journal Online BMIS—An Introduction to the System Environment Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer

Add to Reading List

Source URL: www.isaca.org

Language: English - Date: 2011-07-20 17:46:37
956Microsoft Word - SOphos New Security and Control licences.doc

Microsoft Word - SOphos New Security and Control licences.doc

Add to Reading List

Source URL: www.viglen.co.uk

Language: English - Date: 2007-08-01 08:57:52
957Jasper Bongertz Senior Consultant, Fast Lane GmbH Network Analysis, IT Security, Virtualization 1

Jasper Bongertz Senior Consultant, Fast Lane GmbH Network Analysis, IT Security, Virtualization 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-06-28 14:09:43
958TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

TrustedBSD Project Update 11 May 2006 Robert N. M. Watson Security Research Computer Laboratory University of Cambridge

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-05-13 15:50:57
959Detecting “Certified Pre-owned” Software Tyler Shields, Veracode Chris Wysopal, Veracode March 25, 2009  Introduction

Detecting “Certified Pre-owned” Software Tyler Shields, Veracode Chris Wysopal, Veracode March 25, 2009 Introduction

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
960Microsoft Word - Symantec Endpoint Securityfor web 1st august07.doc

Microsoft Word - Symantec Endpoint Securityfor web 1st august07.doc

Add to Reading List

Source URL: www.viglen.co.uk

Language: English - Date: 2007-08-01 05:11:05