Security University

Results: 12075



#Item
781University of New Mexico / V-12 Navy College Training Program

September 30, 2015 Dear UNM National Security Committee: I want to express my sincere gratitude for your diligence, professionalism, and thoughtful deliberations during the spring semester about the future of national s

Add to Reading List

Source URL: provost.unm.edu

Language: English - Date: 2015-10-15 14:46:36
782Computer security / Software testing / Common Weakness Enumeration / Hacking / Mitre Corporation / Software quality / SofCheck Inspector

SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County

Add to Reading List

Source URL: static1.1.sqspcdn.com

Language: English - Date: 2015-09-09 02:31:41
783Firefighting in the United States / Incident management / Disaster preparedness / Emergency management / Incident Command System / Emergency service / Emergency medical services / Cornell University / Computer security incident management / First responder / Emergency / National Response Framework

Emergency Operations Plan

Add to Reading List

Source URL: emergency.cornell.edu

Language: English - Date: 2014-02-02 21:03:04
784Freedom of information in the United States / George Washington University / National Security Archive / United States government secrecy / Freedom of information laws by country / Freedom of Information Act

USCA Case #Document #Filed:

Add to Reading List

Source URL: epic.org

Language: English - Date: 2016-05-20 11:06:48
785Multihoming / Internet protocols / OSI protocols / Transmission Control Protocol / Identifier/Locator Network Protocol / Communications protocol / IP address / Transport layer

Identity and Location: implications for Security, Privacy and Resilience Saleem Bha) School of Computer Science University of St Andrews

Add to Reading List

Source URL: saleem.host.cs.st-andrews.ac.uk

Language: English - Date: 2016-04-07 10:42:21
786Humancomputer interaction / Usability / Human communication / Computer security / Paul Dourish / User interfaces / Lorrie Cranor / Usability engineering / User experience / Simson Garfinkel / Ethnomethodology / Privacy

Ethnomethodology and Usable Security: The Value of Descriptive Research for Graduate Students Hervé Saint-Louis, PhD Student, Faculty of Information, University of Toronto Instrumental, cognitive and behavioural approac

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-17 22:36:03
787Center for Strategic and International Studies / Georgetown University / Missile defense

Thomas Karako, Senior Fellow, International Security Program, Missile Defense Project EXPERTISE: Defense Strategy and Capabilities, Defense and Security, Geopolitics and International Security ASSOCIATED PROGRAMS: Intern

Add to Reading List

Source URL: cdn.govexec.com

Language: English - Date: 2016-07-28 13:45:28
788Identity documents / Family / Taxation in the United States / Marriage / Birth certificate / Social Security number / Common-law marriage / Social Security / Child support / Social security in Australia / Stepfamily

Dependent Verification for University Benefits The University of Notre Dame requires benefit eligible faculty and staff to provide documentation that supports current spousal or child relationship when enrolling a depend

Add to Reading List

Source URL: hr.nd.edu

Language: English - Date: 2015-09-15 16:10:37
789Law enforcement / Clery Act / Murder of Jeanne Clery / Universities and colleges / California State University police departments / Uniform Crime Reports / Campus police / Police officer / Hate crime / Police / Police departments at the University of California / New York State University Police

ANNUAL CAMPUS SECURITY REPORT Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics October 1, 2015 University Police Department

Add to Reading List

Source URL: wcsu.edu

Language: English - Date: 2015-10-14 11:14:40
790Coding theory / Error detection and correction / Numerical analysis / Finite fields / Search algorithms / Linear code / Nearest neighbor search / Algorithm / Linear algebra / Hamming distance / List decoding / Decoding methods

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May? and Ilya Ozerov?? Horst G¨ ortz Institute for IT-Security Ruhr-University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2015-02-05 05:37:41
UPDATE