Security engineering

Results: 11317



#Item
671Computing / Wi-Fi / Electronic engineering / Wireless access points / IEEE 802.1X / Hotspot / Wireless LAN / Protected Extensible Authentication Protocol / IEEE 802.11 / Wireless networking / Computer network security / Technology

Anyfi Networks Carrier Wi-Fi System BASIC SDWN CORE

Add to Reading List

Source URL: www.anyfinetworks.com

Language: English - Date: 2015-06-22 11:17:44
672Risk / Food science / Security / Genetic engineering / Product safety / Food and Drug Administration / Substantial equivalence / Food safety / Risk assessment / Safety / Food and drink / Health

Microsoft Word - Harries manual1ghlastuse.doc

Add to Reading List

Source URL: www.seeds.iastate.edu

Language: English - Date: 2008-12-11 15:26:27
673Systems engineering / Alarms / Burglar alarm / Reliability engineering / Downtime / BT Group / Insurance / Failure / Security / Safety

TERMS AND CONDITIONS FOR SUPPLY AND INSTALLATION OF AN INTRUDER ALARM, AUTOMATIC FIRE DETECTION SYSTEM & CCTV SYSTEM Part I - Definitions In these Terms and Conditions the following expressions shall have the following m

Add to Reading List

Source URL: www.security201.co.uk

Language: English - Date: 2013-04-29 11:48:00
674Transport engineering / Crime prevention / Security engineering / Warning systems / Intelligent transportation system / Closed-circuit television / Security / National security / Public safety

Pantone Logo no tagline-REG-white

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2015-01-21 16:41:35
675

IP Device Discovery Function User Manual PRELIMINARY  Security Engineering 2014

Add to Reading List

Source URL: www.securityengineering.dk

Language: English - Date: 2015-01-23 06:08:03
    676Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

    2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

    Add to Reading List

    Source URL: wwwx.cs.unc.edu

    Language: English - Date: 2014-09-05 15:38:44
    677Cybernetics / Science / Computer security / Control engineering / Hacking / Access control / Cyberwarfare / Controller / Control system / Technology / Security / Automation

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:47
    678Social information processing / Social engineering / Web 2.0 / Phishing / Spamming / Twitter / Facebook / In-session phishing / World Wide Web / Computing / Social media

    1 Poster: Social Spear-Phishing Robin Gonzalez, Michael E. Locasto University of Calgary

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2015-05-11 16:42:27
    679Internet privacy / Network architecture / Broadband / Electronic engineering / Crypto-anarchism / Virtual private network / Voice over IP / Home network / Modem / Computing / Computer network security / Electronics

    Business plan Metavector Siemens Atea Information and Communications

    Add to Reading List

    Source URL: www.osgi.org

    Language: English - Date: 2013-02-05 20:22:03
    680Computer network security / IEEE 802 / Computer networking / Packet Processing / Deep packet inspection / Quality of service / Cloud computing / WiMAX / System Architecture Evolution / System software / Computing / Electronic engineering

    White Paper Virtualisation in Telecoms Networks Intel® Architecture Processors Networking and Communications Realising the Benefits of Network

    Add to Reading List

    Source URL: www.intel.de

    Language: English - Date: 2014-03-04 14:05:00
    UPDATE