Security engineering

Results: 11317



#Item
131Security / Cryptography / Cyberwarfare / Computer network security / Biological engineering / Body area network / Wireless networking / Internet privacy / Health informatics / Computer security / Encryption / Medical privacy

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-19 08:03:23
132Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
133Procurement / Supply chain management / Systems engineering / BB gun / Bulletin / Business / Military technology / Security

Department of General Services Procurement Division 707 Third Street, Second Floor, West Sacramento, CA5529 Broadcast Date: January 5, 2016

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2016-01-05 20:15:07
134Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
135Information technology / Information technology management / Engineering / Method engineering / Management / Security / Systems engineering / Joint Capabilities Integration Development System / Analysis of Alternatives / Department of Defense Architecture Framework / Risk management / ITIL

Interoperability ClearingHouse Architecture Assurance Method (AAM) A consensus base process standard for enabling sound IT investment decisions Streamlined DoDand Clinger Cohen Act Compliance

Add to Reading List

Source URL: www.ichnet.org

Language: English - Date: 2011-09-13 11:23:10
136Civil engineering / Construction (Design and Management) Regulations

Public Affairs Forum Public Consultation on Proposed Security of Payment Legislation for the Construction Industry - Summary of Comments

Add to Reading List

Source URL: www.forum.gov.hk

Language: English - Date: 2015-10-13 03:18:53
137Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
138Security / Safety / Crime prevention / Aerospace engineering / Aviation safety / Flight test / Product testing / Security alarm / Closed-circuit television / Computer security / Cockpit / AD Aerospace

AIRCRAFT SECURITY AND SAFETY REMOTE REAL-TIME SURVEILLANCE. WIRELESS COMMAND AND CONTROL FOR CRITICAL SYSTEMS. We provide the industry’s leading solutions to internal and external aircraft surveillance and situational

Add to Reading List

Source URL: www.meggitt.com

Language: English - Date: 2016-07-22 06:47:31
139Imaging / Video / Computer graphics / High dynamic range imaging / Media technology / Video compression / High-definition television / High dynamic range / High-dynamic-range imaging / Tone mapping / Motion estimation / Time-lapse photography

Inexpensive High Dynamic Range Video for Large Scale Security and Surveillance Stephen Mangiat and Jerry Gibson Electrical and Computer Engineering University of California, Santa Barbara, CAEmail: {smangiat, gibs

Add to Reading List

Source URL: vivonets.ece.ucsb.edu

Language: English - Date: 2011-08-12 20:19:56
140Cybercrime / Security / Crime / Computing / Identity theft / Social engineering / Spamming / Phishing / Computer security / Email

JPCERT/CC Incident Handling Report[January 1, March 31, 2016]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2016-06-21 01:58:27
UPDATE