×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [security decision]
Home >
security decision
Security audit
218 views
Applying Boyd's OODA Loop Strategy to Drive IT Security Decision and Action
664 views
Security Audit
296 views
1. introduction to semantics
101 views
1. introduction to semantics
35 views
1. Introduction to Semantics (1)
23 views
Introduction to semantics
48 views
Perspectives: Improving SSH-style Host Authentication or How to Strengthen Tofu Dan Wendlandt -
[email protected]
- Carnegie
[email protected]
Joint.
219 views
References Cranor & Garfinkel, Security and Usability, O’Reilly Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?” McCracken.
216 views
Perspectives: Improving SSH-style Host Authentication or How to Strengthen Tofu
25 views
Usable Securit y
58 views
Securing Citizen Facing Applications
612 views
Next >