Information security

Results: 50180



#Item
21SECURITY INFORMATION - RESTRICTED  Introduction This project was initiated to fill a gap in the documentation that was electronically available for the R-390A receiver. In March, 1999, Bill Hawkins scanned the document i

SECURITY INFORMATION - RESTRICTED Introduction This project was initiated to fill a gap in the documentation that was electronically available for the R-390A receiver. In March, 1999, Bill Hawkins scanned the document i

Add to Reading List

Source URL: www.r-390a.net

Language: English - Date: 2007-05-20 14:50:20
    22ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Interim Approved

    ITS POLICIES AND GUIDELINES CATEGORY: Information Technology, Security, Privacy, Information Access & Management STATUS: Interim Approved

    Add to Reading List

    Source URL: its.truman.edu

    Language: English - Date: 2015-09-04 15:23:09
      23Technical Information Series Vol. 1, No. 2 Dedicated to Making the Healthiest Pet Food in the World: Food Quality, Safety, and Security By Brian Streit, VP of Manufacturing

      Technical Information Series Vol. 1, No. 2 Dedicated to Making the Healthiest Pet Food in the World: Food Quality, Safety, and Security By Brian Streit, VP of Manufacturing

      Add to Reading List

      Source URL: www.evopet.com

      Language: English
        24Welcome to 2017! The last half of December was very busy and productive in the Information, Communication and Cyber Security area. Below is the list of deliverables recently posted to the member center. Also, the year is

        Welcome to 2017! The last half of December was very busy and productive in the Information, Communication and Cyber Security area. Below is the list of deliverables recently posted to the member center. Also, the year is

        Add to Reading List

        Source URL: smartgrid.epri.com

        Language: English - Date: 2018-04-23 15:23:28
          25Information Security Policy [Basic Principle] Hitachi Capital protects its information assets in an appropriate manner with the information security management system.  [Action Guidelines]

          Information Security Policy [Basic Principle] Hitachi Capital protects its information assets in an appropriate manner with the information security management system. [Action Guidelines]

          Add to Reading List

          Source URL: www.hitachi-capital.co.jp

          Language: English - Date: 2016-02-29 02:36:44
            26Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

            Appears in P. J. Lee, C. H. Lim (Eds.): Information Security and Cryptology – ICISC 2002, Springer-Verlag LNCS 2587, pp. 298–312, ISBN, 2003. Improved Techniques for Fast Exponentiation Bodo M¨oller Te

            Add to Reading List

            Source URL: www.bmoeller.de

            Language: English - Date: 2006-01-02 00:24:26
              27SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi  Abstract

              SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi Abstract

              Add to Reading List

              Source URL: ioactive.com

              Language: English - Date: 2018-08-17 20:57:56
                28Using CertAgent® with DRBD for High Availability  VersionFebruary 25, 2013  The information contained in this document represents the current view of Information Security

                Using CertAgent® with DRBD for High Availability VersionFebruary 25, 2013 The information contained in this document represents the current view of Information Security

                Add to Reading List

                Source URL: www.infoseccorp.com.

                Language: English - Date: 2018-01-16 08:16:26
                  29Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies Aslan Askarov Harvard University  Abstract—In systems that handle confidential information,

                  Learning is Change in Knowledge: Knowledge-based Security for Dynamic Policies Aslan Askarov Harvard University Abstract—In systems that handle confidential information,

                  Add to Reading List

                  Source URL: askarov.net

                  Language: English - Date: 2017-05-02 08:00:35
                    30Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

                    Timing-Sensitive Information Flow Analysis for Synchronous Systems Boris K¨opf and David Basin Information Security ETH Zurich, Switzerland {bkoepf,basin}@inf.ethz.ch

                    Add to Reading List

                    Source URL: software.imdea.org

                    Language: English - Date: 2010-09-02 11:11:48