Security engineering

Results: 11317



#Item
771Electronic engineering / Password / Security token / Mobile telecommunications / Mobile phone / Technology / Digital media / One-time password

MANUAL Skapat av (Efternamn, Förnamn, org.) Dokumentdatum

Add to Reading List

Source URL: www.trafikverket.se

Language: English - Date: 2015-03-14 07:56:39
772High-definition television / Electronic engineering / Electronics / Live-preview digital cameras / Red Digital Cinema Camera Company / Camera lens / Consumer electronics

HomeMonitor HD Delivers Enhanced Home Security Experience New camera from Y-cam brings affordable HD quality security to your home, offering you an easy way to connect to the things you love  High Definition - produc

Add to Reading List

Source URL: www.homemonitor.me

Language: English - Date: 2013-12-17 08:06:44
773Information theory / Radio electronics / IEEE 802 / MIMO / Antenna / Electronics / Electronic countermeasures / Antenna diversity / Radio resource management / Telecommunications engineering / Electronic engineering

2013 IEEE Symposium on Security and Privacy On Limitations of Friendly Jamming for Confidentiality Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun Institute of Information Security ETH Zurich

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-04-05 19:56:18
774Security / Critical infrastructure protection / Security engineering / North American Electric Reliability Corporation / Federal Energy Regulatory Commission / Reliability engineering / Critical infrastructure / PlayStation Portable / National security / United States Department of Homeland Security / Infrastructure

FAC TRMR-46 Reclamation Manual Directives and Standards TEMPORARY RELEASE (Expires)

Add to Reading List

Source URL: www.usbr.gov

Language: English - Date: 2015-05-21 12:53:15
775Subroutines / Control flow / Cross-platform software / JavaScript / Callback / Stub / Serialization / Eval / Computing / Software engineering / Computer programming

Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains James Mickens Microsoft Research Abstract—Pivot is a new JavaScript isolation framework for

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
776Software testing / Technology / Hacking / Vulnerability / Smart card / Common Criteria / Reverse engineering / ISO standards / Computer security / Cyberwarfare

Joint Interpretation Library Application of Attack Potential to Smartcards Version 2.9 January 2013

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:20:23
777Software quality / Vulnerability / Buffer overflow / Stack buffer overflow / C dynamic memory allocation / Malware / C / Stack / Computing / Software bugs / Software engineering

Poster: Targeted Therapy for Program Bugs Qiang Zeng Mingyi Zhao Peng Liu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:28
778Cyberwarfare / Security engineering / Computer crimes / Computer security / Critical infrastructure protection / Computer emergency response team / National Cyber Security Division / Cyber-security regulation / National security / Security / United States Department of Homeland Security

COUNTRY: GERMANY Germany has a comprehensive cybersecurity strategy, adopted in 2011 and complemented by a strong cybersecurity legal framework. The existence of the Federal Office for Information Security (BSI), in char

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:08:32
779Spamming / Computer crimes / Social engineering / Password / Phishing / HTTP cookie / Cross-site scripting / Email / Malware / Security / Computing / Computer security

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.chriskarlof.com

Language: English - Date: 2012-01-02 15:39:31
780Crime prevention / Security engineering / PlayStation Portable / Computer security / Critical infrastructure protection / Telephone numbers in the United Kingdom / Access control / Physical security / Security guard / Security / National security / Public safety

DOC Document

Add to Reading List

Source URL: www.usbr.gov

Language: English - Date: 2015-05-21 12:53:14
UPDATE