Covert

Results: 573



#Item
515 Which Processes Satisfy the Second Law? Thomas M. Covert Durand Bldg Rm 121 Sranford University Stanford, CA 9430 I, USA

5 Which Processes Satisfy the Second Law? Thomas M. Covert Durand Bldg Rm 121 Sranford University Stanford, CA 9430 I, USA

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2014-02-18 12:20:16
52TECHNICAL SPECIFICATIONS Offered as an optional accessory, the covert EyeMax Wireless A/V Surveillance System may be used with the VerTmax Telescopic Pole independently, or together with the VerTmax Grappling Hook and Ta

TECHNICAL SPECIFICATIONS Offered as an optional accessory, the covert EyeMax Wireless A/V Surveillance System may be used with the VerTmax Telescopic Pole independently, or together with the VerTmax Grappling Hook and Ta

Add to Reading List

Source URL: www.resqmax.com

Language: English - Date: 2015-02-13 17:19:21
    53AFIO Intelligencer Summer/Fall 2012

    AFIO Intelligencer Summer/Fall 2012

    Add to Reading List

    Source URL: www.afio.com

    Language: English - Date: 2015-09-18 16:54:14
    54Covert ops THE TRAINING IS REAL – THE MISSION IS FUN Pistol Shooting, Hand-to-Hand Combat, Hostage Rescue & More www.covertops.com

    Covert ops THE TRAINING IS REAL – THE MISSION IS FUN Pistol Shooting, Hand-to-Hand Combat, Hostage Rescue & More www.covertops.com

    Add to Reading List

    Source URL: www.incredible-adventures.com

    Language: English - Date: 2016-03-09 10:09:34
      55Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

      Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud Zhenyu Wu Zhang Xu Haining Wang The College of William and Mary

      Add to Reading List

      Source URL: www.cs.wm.edu

      Language: English - Date: 2012-08-20 22:24:04
        561  An Entropy-Based Approach to Detecting Covert Timing Channels Steven Gianvecchio and Haining Wang

        1 An Entropy-Based Approach to Detecting Covert Timing Channels Steven Gianvecchio and Haining Wang

        Add to Reading List

        Source URL: www.cs.wm.edu

        Language: English - Date: 2012-08-08 12:14:52
          57Measuring and Mitigating Side Channels Introduction Side Channels Covert Channels A Motivating Example

          Measuring and Mitigating Side Channels Introduction Side Channels Covert Channels A Motivating Example

          Add to Reading List

          Source URL: research.davidcock.fastmail.fm

          Language: English - Date: 2014-11-20 18:55:42
            58Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

            Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

            Add to Reading List

            Source URL: www.cs.wm.edu

            Language: English - Date: 2013-05-30 14:58:15
            59Microsoft Word - cair day 2.doc

            Microsoft Word - cair day 2.doc

            Add to Reading List

            Source URL: www.investigativeproject.org

            Language: English - Date: 2008-03-25 08:56:55
            60The Regulation of Investigatory Powers Act (RIPA) BACKGROUND The Regulation of Investigatory Powers ActRIPA) governs the use of covert surveillance powers. In 2012 the Protection of Freedoms Act was introduced, pa

            The Regulation of Investigatory Powers Act (RIPA) BACKGROUND The Regulation of Investigatory Powers ActRIPA) governs the use of covert surveillance powers. In 2012 the Protection of Freedoms Act was introduced, pa

            Add to Reading List

            Source URL: www.bigbrotherwatch.org.uk

            Language: English - Date: 2015-10-16 13:52:07