Security engineering

Results: 11317



#Item
951Wi-Fi Protected Access / Wireless networking / Technology / Telecommunications engineering / Computing / Comparison of 802.15.4 radio modules / DBm / Computer network security / IEEE 802.11

MEGAMESH OUTDOOR WIRELESS ROUTER 2 RADIOS DUAL-BAND 2,4 GHZ AND 5 GHZ UP TO 200 MBIT/S TCP Luceor solutions enable high

Add to Reading List

Source URL: www.luceor.com

Language: English - Date: 2014-12-09 10:20:08
952Data / Denial-of-service attack / Card reader / Computer security / Public-key cryptography / Concurrency control / Backup / Database / Credit card / Computer network security / Security / Computing

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 6 Distributed Systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 11:53:33
953Industrial hygiene / Safety engineering / Occupational safety and health / Occupational Safety and Health Administration / Personal protective equipment / Construction / Emergency management / Right to know / HAZWOPER / Safety / Security / Health

DOC Document

Add to Reading List

Source URL: oasis.northgrum.com

Language: English - Date: 2012-10-10 15:15:00
954United States Department of Labor / Government / Employee Benefits Security Administration / Workforce Investment Act / Occupational Safety and Health Administration / Workplace safety / Employee Retirement Income Security Act / Human resource management / Employment and Training Administration / Safety / Occupational safety and health / Safety engineering

2013 Top Management Challenges Facing the Department of Labor For 2013, the OIG considers the following as the most serious management and performance challenges facing the Department: • • •

Add to Reading List

Source URL: www.oig.dol.gov

Language: English - Date: 2013-12-17 17:07:37
955HAZWOPER / Esh / Security / Prevention / Civil engineering / Construction / Safety

CONTRACTOR NOTIFICATION LIST ENVIRONMENTAL SAFETY AND HEALTH (ESH) SPACE PARK, MANHATTAN AND REDONDO BEACH FACILITIES, CALIFORNIA Notification Agency Visit

Add to Reading List

Source URL: oasis.northgrum.com

Language: English - Date: 2014-09-04 18:05:12
956Confidence tricks / Spamming / Theft / Phishing / Social engineering / Identity theft / Ethics / Password / Internet privacy / Crime / Security / Computer crimes

Cybersecurity Commissioner Adam Hamm Types of Cyber Crime Identity Theft

Add to Reading List

Source URL: ereg.naic.org

Language: English - Date: 2015-05-01 12:36:29
957Medical informatics / Privacy / Health informatics / International standards / Medical terms / Bell–LaPadula model / Medical privacy / Information privacy / Electronic health record / Medicine / Health / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 8 Multilateral Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 05:54:48
958Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:02
959Energy crops / Genetic engineering / International Service for the Acquisition of Agri-biotech Applications / Environmental issues / Genetically modified food / Biotechnology / Food security / Cotton / Maize / Food and drink / Agriculture / Biology

March 5, 2014 TOP TEN FACTS about Biotech/GM Crops in 2013 Global Status of Commercialized Biotech/GM Crops: 2013 By Clive James, Founder and Emeritus Chair, ISAAA Dedicated to the late Nobel Peace Laureate, Norman Borla

Add to Reading List

Source URL: www.igtcglobal.com

Language: English - Date: 2014-03-19 08:56:09
960Computer network security / Cryptography / Password / Computer security / Ouch / Information security / Wi-Fi / Passphrase / Social engineering / Security / Crime prevention / National security

OUCH! | May, 2015 IN THIS ISSUE... • Overview • The Basics • Visiting Kids

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-05-04 12:26:36
UPDATE