Security engineering

Results: 11317



#Item
191Security / Prevention / Safety / Government procurement in the United States / Computer security / Crime prevention / Contract law / Systems engineering / General contractor / Performance work statement / Statement of work / Subcontractor

NLKNPO NOAALink_Peformance_Work_Statement(PWS)Template.docx

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-11-18 14:50:21
192Life skills / Motivation / Business continuity and disaster recovery / National security / Resilience / Security / Prevention / Psychological resilience / Safety / Ecological resilience / Biology / Aaron Wildavsky

SOCIOTECHNICAL SYSTEM RESILIENCE ASSESSMENT AND IMPROVEMENT METHOD

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:12:04
193Safety / Occupational safety and health / Chemical safety / Health / Safety engineering / Industrial hygiene / Environmental law / Safety data sheet / Emergency management / Chemical accident / Dangerous goods / Emergency response

International Centre for Chemical Safety and Security Draft Project Local Awareness and Responsibility in Chemical Safety and Security in China

Add to Reading List

Source URL: www.iccss.eu

Language: English - Date: 2015-07-13 05:43:42
194Engineering / Systems science / Security / Systems engineering / Software quality / Occupations / Cyberwarfare / System of systems / Reliability engineering / Computer security / Military acquisition / Defense Technical Information Center

Inside the Beltway The ITEA Journal of Test and Evaluation 2016; 37: 10-16 Copyright © 2016 by the International Test and Evaluation Association Defense System Complexity: Engineering Challenges and Opportunities

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2016-04-15 16:55:43
195Password / Security

Remotely Setting a Port to a Program This tutorial outlines the procedure to remotely set an audio port to EVENTS with an IRD Command via the http://myxdsreceiver.premiereradio.com site. Step 1: Log onto the site using y

Add to Reading List

Source URL: engineering.premiereradio.com

Language: English - Date: 2016-07-20 17:48:54
196Crime prevention / Security / Prevention / Safety / Security engineering / Surveillance / Environmental psychology / Criminology / Crime prevention through environmental design / Natural surveillance / Closed-circuit television / Changing room

Crime Prevention Through Environmental Design CPTED Principles Checklist for Kentucky Public Schools KRS, Required review of Crime Prevention Through Environmental Design (CPTED) principles prior to school constr

Add to Reading List

Source URL: kycss.org

Language: English - Date: 2013-11-08 16:21:14
197Actuarial science / Risk / Management / Value ethics) / Prevention / Professional studies / Systems engineering / Security / Risk management / Operational risk / Best practice / Enterprise risk management

“ RIMS Annual Conference is a must do for any level of risk professional. By attending you can increase your knowledge and walk away with better deals on your insurance renewals. The conference is well worth every mom

Add to Reading List

Source URL: www.rims.org

Language: English - Date: 2016-01-25 12:23:20
198Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Data security / Information security / Systems engineering / Computer security

Master of Science Program in Information Technology Degree RequirementsIT 5413 Software Design and Development IT 5443 Web

Add to Reading List

Source URL: ccse.kennesaw.edu

Language: English - Date: 2015-08-15 14:09:11
199Crime prevention / Security / Criminology / Prevention / Law enforcement / Security engineering / Environmental psychology / National security / Crime prevention through environmental design / Natural surveillance / Environmental criminology / Closed-circuit television

Urban spaces – enhancing the attractiveness and quality of the urban environment WP3 Joint Strategy Activity 3.2 Criteria and Principles

Add to Reading List

Source URL: www.central2013.eu

Language: English - Date: 2010-10-06 07:03:47
200Computing / Software engineering / Computer security / Cryptography / Trusted computing / Smart cards / Trusted Platform Module / Closure / Variable / Java Card / Subroutine / Trusted Execution Technology

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-06-16 20:15:44
UPDATE