Social software engineering

Results: 749



#Item
91Action theory / Philosophy of science / Social philosophy / Software engineering / GOAL agent programming language / Classical cipher / Computer programming / Computing / Action

213 ARTIFICIAL INTELLIGENCE Intention Is Choice with Commitment* Philip R. Cohen

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2005-09-17 11:12:50
92Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Social engineering / Application security / Attack / Computer security / Computer network security / Cyberwarfare

ACROS Security: ACROS Penetration Test, Frequently Asked Questions ACROS Penetration Test A Friendly “Advanced Persistent Threat” Simulation Frequently Asked Questions 1.

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:09
93Software engineering / Computing / Computer programming / Chromium nitride / Nitrides / Ch

CRN AUSTRALIA - BULLETIN ARTICLE SEPTEMBERTHE IMPORTANCE OF CRN MEMBERSHIP Whether you are a community recycler, social entrepreneur, government or waste related organisation, or simply an individual who cares abo

Add to Reading List

Source URL: communityrecycling.com.au

Language: English - Date: 2014-09-17 07:30:26
94Computing / Environmental social science / Industrial hygiene / Occupational safety and health / Risk management / Safety engineering / Hip hop music / Hop / African-American culture / Software engineering / Computer programming

University of Texas – Pan American Management Values at UTPA Introduction This Guide highlights important responsibilities upheld by managers at the University of Texas – Pan American, and identifies related policies

Add to Reading List

Source URL: www.utpa.edu

Language: English - Date: 2014-05-06 21:01:15
95Artificial intelligence / Behavioural sciences / Social psychology / Agent-based model / Complex systems theory / Software agent / Intelligent agent / Knowledge management / Organizational behavior / Science / Management / Sociology

Putting Engineering into the Enterprise System

Add to Reading List

Source URL: www.cs.uu.nl

Language: English - Date: 2004-04-01 03:44:19
96Phishing / Internet / Computing / Email spam / Crime / Anti-phishing software / Spamming / Email / Social engineering

Nov_10_08_IEEE_APWG_08_paper_PK

Add to Reading List

Source URL: www.chariotsfire.com

Language: English - Date: 2014-01-01 11:16:49
97Internet / Cybercrime / Confidence tricks / Cross-platform software / Web 2.0 / Lottery scam / Gmail / Phishing / Google / Spamming / Social engineering / Computing

Class 3: Identify Tricks and Scams Online Student Handout Identify Tricks and Scams Online

Add to Reading List

Source URL: www.ikeepsafe.org

Language: English - Date: 2013-06-22 12:05:05
98Email / Internet / Phishing / Computing / Website / Crime / CUPS / Anti-phishing software / Norton Internet Security / Spamming / Social engineering / Computer crimes

Microsoft Word - may_23_ss_bm_pk_aa_lc_jh_en_soups_final.doc

Add to Reading List

Source URL: www.chariotsfire.com

Language: English - Date: 2014-01-01 11:16:56
99Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
100Social information processing / Blog / Reading / Technology / Linguistics / Internet culture

Software Engineering Group Projects Learning Portfolio Assessment Rubric Student Number: Criterion

Add to Reading List

Source URL: cs.anu.edu.au

Language: English - Date: 2015-03-09 02:19:48
UPDATE