Security engineering

Results: 11317



#Item
851Technology / Software quality / Data security / Formal methods / Systems engineering process / IT risk management / Quality assurance / Reliability engineering / Software development process / Systems engineering / Science / Information technology management

Department of Information Technology IV&V Guidelines [Which, e.g. Initial, Interim, Final] IV&V Report: [Agency Name] [Deliverable Name and/or #]

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2011-07-21 15:53:24
852Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
853Hampering the Human Hacker and the Threat of Social Engineering Using Automation to Protect Your Customers and Your Business  INTRODUCTION

Hampering the Human Hacker and the Threat of Social Engineering Using Automation to Protect Your Customers and Your Business INTRODUCTION

Add to Reading List

Source URL: voxeo.com

Language: English - Date: 2013-02-22 10:31:53
854FortiAPTM-221C and 320C 802.11ac Wireless Access Points The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromis

FortiAPTM-221C and 320C 802.11ac Wireless Access Points The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromis

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:13
855You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
856Microsoft Word - Registration Instructions

Microsoft Word - Registration Instructions

Add to Reading List

Source URL: www.nwhospital.org

Language: English - Date: 2014-06-06 15:04:07
857Senior GRC Systems Engineer NuHarbor is looking for a Senior GRC Systems Engineer! Join an elite team of security professionals who are driven for success in finding innovative ways to solve problems for our company and

Senior GRC Systems Engineer NuHarbor is looking for a Senior GRC Systems Engineer! Join an elite team of security professionals who are driven for success in finding innovative ways to solve problems for our company and

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-03-24 14:48:26
858Asia promotion  • 16,000 Monthly Copies • Published in English • Editorial closing date: 10th of the prior month • Advertisement closing date: 20th of the prior month

Asia promotion • 16,000 Monthly Copies • Published in English • Editorial closing date: 10th of the prior month • Advertisement closing date: 20th of the prior month

Add to Reading List

Source URL: www.mfnewera.com

Language: English - Date: 2014-01-21 20:23:32
859July 8, 2013  The WSU Institutional Biosafety Committee

July 8, 2013 The WSU Institutional Biosafety Committee

Add to Reading List

Source URL: www.bio-safety.wsu.edu

Language: English - Date: 2013-07-08 15:23:39
860Case study  Scalable storage solution improves Alfa Laval information management Engineering company Alfa Laval needed to free up storage capacity and enhance performance in its virtualised server environment. The old ba

Case study Scalable storage solution improves Alfa Laval information management Engineering company Alfa Laval needed to free up storage capacity and enhance performance in its virtualised server environment. The old ba

Add to Reading List

Source URL: www.proact.lv

Language: English - Date: 2012-01-23 10:36:06