Social software engineering

Results: 749



#Item
81VOLUME 11 ISSUE 6  April , 2015 Trainings & Events (Central Standard Time)

VOLUME 11 ISSUE 6 April , 2015 Trainings & Events (Central Standard Time)

Add to Reading List

Source URL: adagreatlakes.com

Language: English - Date: 2015-05-05 13:31:37
82Kansas  Owner detail report To accompany the Summary of Unclaimed Property You are required to report as much information as your records indicate per KSA

Kansas Owner detail report To accompany the Summary of Unclaimed Property You are required to report as much information as your records indicate per KSA

Add to Reading List

Source URL: www.kansasstatetreasurer.com

Language: English - Date: 2011-06-30 15:04:19
83Instance Based Social Network Representation Amit Levy Computer Science & Engineering University of Washington

Instance Based Social Network Representation Amit Levy Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
84Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner Ang Cui and Salvatore J. Stolfo {ang,sal}@cs.columbia.edu Department of Computer Science Columbia University

Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner Ang Cui and Salvatore J. Stolfo {ang,sal}@cs.columbia.edu Department of Computer Science Columbia University

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:41:58
85Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems To Prototype New Ones Catherine Grevet and Eric Gilbert School of Interactive Computing Georgia Institute of Technology , gilb

Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems To Prototype New Ones Catherine Grevet and Eric Gilbert School of Interactive Computing Georgia Institute of Technology , gilb

Add to Reading List

Source URL: comp.social.gatech.edu

Language: English - Date: 2015-02-03 12:25:09
86

PDF Document

Add to Reading List

Source URL: communityrecycling.com.au

Language: English - Date: 2013-07-10 23:35:29
87Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
8812 Hall Street EAGLEHAWK VIC 3556 PhFaxEmail:  Web: www.communityrecycling.com.au

12 Hall Street EAGLEHAWK VIC 3556 PhFaxEmail: Web: www.communityrecycling.com.au

Add to Reading List

Source URL: www.communityrecycling.com.au

Language: English - Date: 2013-07-10 23:35:29
89Metrics of collateral damage from blacklisting of domains exploited by “phishing” operations. John Nagle SiteTruth February, 2008

Metrics of collateral damage from blacklisting of domains exploited by “phishing” operations. John Nagle SiteTruth February, 2008

Add to Reading List

Source URL: www.sitetruth.com

Language: English - Date: 2012-01-18 15:18:01
90Partnership for Education and Research about Responsible Living www.perlprojects.org NEWSLETTER Issue 8: August 2012

Partnership for Education and Research about Responsible Living www.perlprojects.org NEWSLETTER Issue 8: August 2012

Add to Reading List

Source URL: perlprojects.org

Language: English