Gunnar

Results: 850



#Item
471Log analysis / Syslog / Information technology security audit / Logging / Login / Log management and intelligence / Computer data logging / Computing / Network management / Information technology management

Building Security In Editors: John Steven, [removed] Gunnar Peterson, [removed] How to Do Application Logging Right

Add to Reading List

Source URL: arctecgroup.net

Language: English - Date: 2010-08-04 12:44:52
472

L. Solemdal og G. Kvamme / Grønn kunnskap[removed]Erfaringer fra omlegging av kjøkkenet på St. Olavs Hospital, Trondheim Liv Solemdal1), Gunnar Kvamme2) / [removed] 1)

Add to Reading List

Source URL: orgprints.org

Language: Norwegian - Date: 2010-04-20 10:09:37
    473Roméo Dallaire / Bantu / Ethnic groups in Rwanda / Rwandan Genocide / Responsibility to protect / United Nations Assistance Mission for Rwanda / Genocide / Rwanda / Tutsi / Ethnic groups in Africa / Africa / International relations

    Published in: Environment and Planning D, Vol. 26, 2008, p[removed]Gunnar Olsson UNTITLED Deep down a movie is a map, picture and story merged into an imagination designed to tell me not only where I am, but whence I cam

    Add to Reading List

    Source URL: www.artasfoundation.ch

    Language: English - Date: 2014-08-02 06:24:07
    474Cyberwarfare / Computer network security / Application security / Security / Vulnerability / Penetration test / Code review / Static program analysis / Test automation / Computer security / Software testing / Computing

    Building Security In Editors: John Steven, [removed] Gunnar Peterson, [removed] Deborah A. Frincke, [removed] State of Application

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:31
    475Security / Passphrase / Chosen-plaintext attack / Chosen-ciphertext attack / Crypt / Ciphertext / Key / Secure Shell / Known-plaintext attack / Cryptography / Espionage / Cyberwarfare

    Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Using Attack Graphs to Design Systems

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:33
    476Computer network security / Security / Software requirements / Software project management / Data security / Misuse case / Threat model / Use case / Threat / Software development / Computer security / Cyberwarfare

    Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Defining Misuse within the Development Process

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:28
    477Philosophy of science / Free will / Knowledge / Causality / Philosophy of life / Compatibilism / Moral responsibility / Incompatibilism / Intuition / Determinism / Philosophy / Metaphysics

    Having your strings pulled: An error theory for manipulation arguments GUNNAR BJÖRNSSON UMEÅ UNIVERSITY; THE UNIVERSITY OF GOTHENBURG A number of incompatibilists about moral responsibility have argued that causal het

    Add to Reading List

    Source URL: philosophy.ucsd.edu

    Language: English - Date: 2013-03-06 12:05:53
    478Computer network security / Software testing / Data security / Software development process / Vulnerability / Software engineering / Penetration test / Information security management system / Computer standard / Security / Computer security / Cyberwarfare

    Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Essential Factors for Successful Software

    Add to Reading List

    Source URL: www.cigital.com

    Language: English - Date: 2013-11-26 20:39:27
    479Statistical classification / Linear algebra / Free statistical software / Shogun / Support vector machine / Kernel methods / String kernel / Kernel / Linux kernel / Statistics / Machine learning / Algebra

    sho gun S¨ oren Sonnenburg,† Gunnar R¨atsch,♮ Fabio De Bona♮

    Add to Reading List

    Source URL: sonnenburgs.de

    Language: English - Date: 2010-09-04 02:43:04
    480Free statistical software / Linear algebra / Shogun / Support vector machine / Kernel methods / String kernel / Kernel / Least squares support vector machine / Statistics / Machine learning / Statistical classification

    sho gun S¨ oren Sonnenburg,† Gunnar R¨atsch,♮ Fabio De Bona♮

    Add to Reading List

    Source URL: sonnenburgs.de

    Language: English - Date: 2010-09-04 02:43:04
    UPDATE