Security engineering

Results: 11317



#Item
151Life skills / Motivation / Business continuity / National security / Resilience / Security / Psychological resilience / Prevention / Ecological resilience / Biology / Ecology

OVERVIEW OF CHALLENGES IN RESILIENCE ENGINEERING: A CONSULTATION ON THE FINDINGS OF THE LLOYD’S REGISTER FOUNDATION INTERNATIONAL WORKSHOP ON RESILIENCE ENGINEERING Michael Bruno Dean, School of Engineering & Science

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:24:17
152Security engineering / Security / Prevention / Access control / National security / Crime prevention / Airport security / Homeland security / Transportation Security Administration / Computer security

IB Union Calendar No. 505 114TH CONGRESS 2D SESSION

Add to Reading List

Source URL: docs.house.gov

Language: English
153Software / SCADA / Computing / Computer network security / Computer security / WinCC / Control engineering / CVSS / S7 / Countermeasure / Vulnerability

Siemens Security Advisory by Siemens ProductCERT SSA: Vulnerabilities in SIMATIC WinCC, PCS 7 and WinCC Runtime Professional Publication Date

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2016-08-11 10:42:00
154Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
155Food and drink / Agronomy / Agriculture / Academia / Nexus / Sustainability / Water resource management / Food security / Agricultural engineering / Water /  energy and food security nexus / German Advisory Council on Global Change

POSITION PAPER – Extended Summary Bridging the Water and Food Gap: The Role of the Water-Energy-Food Nexus Rabi H. Mohtar, Amjad T. Assi and Bassel T. Daher Day 3 | Population Growth

Add to Reading List

Source URL: www.dresden-nexus-conference.org

Language: English - Date: 2016-03-14 09:35:10
156Identity management / Computer access control / FIPS 201 / Standards / Presidential directive / Cryptography / Authentication / Credential / Interoperability / Computer security / Engineering

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
157Engineering / Technology / Avionics / Embedded systems / Computing / Safety engineering / DO-178B / DO-254 / Documentation / Communications security / International Traffic in Arms Regulations

COLL A BOR AT ING W IT H CLIENTS TO DEVELOP INNOVAT I V E NE W TECHNOLOGY ®

Add to Reading List

Source URL: www.vanteon.com

Language: English - Date: 2015-12-29 11:33:22
158Surveillance / Security / Video / Prevention / Imaging / Physical security / Security engineering / Closed-circuit television / IP camera / Axis Communications / Professional video over IP

Pantone Logo no tagline-REG-white

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2016-02-19 05:24:26
159Computing / Software engineering / Software / Hypertext Transfer Protocol / JavaScript / Web development / World Wide Web / Ajax / HTTP cookie / Cross-site scripting / XMLHttpRequest / Cross-site request forgery

Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-11-01 16:33:26
160United States Department of Homeland Security / Government / United States intelligence agencies / National security / Safety / Infrastructure / Security engineering / Cyberwarfare / Critical infrastructure protection / United States Computer Emergency Readiness Team / DHS Office of Intelligence and Analysis / Risk management

Regional Overview of Critical Infrastructure Programs: Region Snapshots May 2016 i Introduction:

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-05-19 16:45:07
UPDATE