Security Patterns

Results: 182



#Item
71Harare Declaration / Zimbabwe / Human rights instruments / Commonwealth of Nations / Human rights / Millennium Development Goals / Rule of law / Universal Declaration of Human Rights / Melbourne Principles / International relations / Politics / Ethics

Charter of the Commonwealth We the people of the Commonwealth: Recognising that in an era of changing economic circumstances and uncertainty, new trade and economic patterns, unprecedented threats to peace and security,

Add to Reading List

Source URL: cfnhri.org

Language: English - Date: 2012-12-21 01:47:03
72Computer security / Supply chain management / Hacking / Software testing / Attack / Vulnerability / Threat / Supply chain / Malware / Cyberwarfare / Computer network security / Business

Supply Chain Attack Framework and Attack Patterns

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-06-16 14:43:58
73Economics / Social capital / Australian Institute of Family Studies / Sociology of the family / Welfare / Social policy / Foster care / Adoption / Social Security / Family / Government / Sociology

Changing Patterns o CHANGING PATTERNS OF Issues in the Literature

Add to Reading List

Source URL: www.aifs.gov.au

Language: English - Date: 2013-12-19 01:06:03
74Pattern / Genetically modified organism / Computer network security / Metaphysics / Structure / Form / Road transport / Grid plan / Inspection

Practice Note: Field monitoring patterns In accordance with the Gene Technology Act[removed]February 2015

Add to Reading List

Source URL: www.ogtr.gov.au

Language: English - Date: 2015-03-06 01:30:15
75Software / Application firewall / Cyberwarfare / Web application security / Firewall / Application security / Waf / Computer network security / Computer security / Computing

Case study HAMBURG WASSER Protecting Web applications for customers Over 30,000 Hamburg households can use the Internet to find out more about their water consumption patterns, their meter readings and bills. With only

Add to Reading List

Source URL: www.airlock.com

Language: English - Date: 2015-02-13 04:42:13
76Police / Public safety / Surveillance / Metropolitan Police Service / Abuse / New South Wales Police Force / Domestic violence / Criminal Investigation Department / Law enforcement in the United Kingdom / National security / Security / Law enforcement

Do women make a difference? Deployment patterns of women in the NSW Police Service Christine Jennett (Charles Sturt University) and

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-06-09 04:43:21
77Inflation / Social Security / Economics / Deficit reduction in the United States / Aging / Retirement / Termination of employment

How Do Spending Needs Evolve During Retirement? By Wade Pfau March 13, 2012 Most people’s spending patterns change over the course of retirement – expenses look very different at 90 than they do at 65. Yet most resea

Add to Reading List

Source URL: www.advisorperspectives.com

Language: English - Date: 2012-03-12 10:43:47
78Computer vision / Image processing / Anomaly detection / Data mining / Data security / Video tracking / Mixture model / Kadir–Brady saliency detector / Statistics / Artificial intelligence / Probability and statistics

Learning Object Motion Patterns for Anomaly Detection and Improved Object Detection Arslan Basharat, Alexei Gritai, and Mubarak Shah Computer Vision Lab, School of Electrical Engineering and Computer Science, University

Add to Reading List

Source URL: eecs.ucf.edu

Language: English - Date: 2008-08-28 14:07:30
79United States Department of Homeland Security / Government / Public safety / Public administration / Mitre Corporation / United States Department of Defense / Attack patterns

Understanding How They Attack Your Weaknesses: CAPEC Sean Barnum MITRE

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:14
80Electronic commerce / Secure communication / Crime prevention / National security / Cyberwarfare / Computer security / Security and safety features new to Windows Vista / Windows Server / Computer network security / Security / Computing

Securing J2EE Applications – Coding Patterns for Secure Connections to Services Jeff Williams Aspect Security CEO [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:22
UPDATE