- European Symposium On Research In Computer Security
- Information technology: ESORICS (Conference)
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
List of computer science conferences — This is a list of academic conferences in computer science. Most of these academic conferences are annual or bi annual events.The order with which the conferences are listed in their respective fields corresponds to a rough and non authoritative… … Wikipedia
Non-interference (security) — This article is about a security policy model. For the Buddhist concept, see Noninterference (Buddhism). Non interference is a strict multilevel security policy model, first described by Goguen and Meseguer in 1982, and amplified further in 1984 … Wikipedia
Computer network — Computer networks redirects here. For the periodical, see Computer Networks (journal). Datacom redirects here. For other uses, see Datacom (disambiguation). Internet map. The Internet is a global system of interconnected computer networks that… … Wikipedia
Computer Professionals for Social Responsibility — Abbreviation CPSR Motto Technology is driving the future... it is up to us to do the steering Formation 1983 Type NGO Purpose/focus … Wikipedia
Computer art — Arambilet: Dots on the I s, D ART 2009 Online Digital Art Gallery, exhibited at IV09 and CG09 computer Graphics conferences, at Pompeu Fabra University, Barcelona; Tianjin University, China; Permanent Exhibition at the London South Bank… … Wikipedia
Kernel (computer science) — In computer science, the kernel is the central component of most computer operating systems (OS). Its responsibilities include managing the system s resources (the communication between hardware and software components). As a basic component of… … Wikipedia
Liste der kryptologischen Konferenzen — Die Liste der kryptologischen Konferenzen führt die wichtigsten regelmäßig stattfindenden Konferenzen oder Workshops im Bereich der Kryptologie auf. Die aktuellen Daten werden von den jeweiligen Veranstaltern veröffentlicht. Inhaltsverzeichnis 1… … Deutsch Wikipedia
MIFARE — is the NXP Semiconductors owned trademark of a series of chips widely used in contactless smart cards and proximity cards. According to the producers, billions of smart card chips and many millions of reader modules have been sold.[1] The… … Wikipedia
Massachusetts Bay Transportation Authority v. Anderson — United States District Court for the District of Massachusetts Filed August 8, 2008 Decided August 19, 2008 Case name Massachusetts Bay Transportation Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of… … Wikipedia
Illinois Security Lab — The Illinois Security Lab is a research laboratory at the University of Illinois Urbana Champaign established in 2004 to support research and education in computer and network security. The lab is part of the UIUC Computer Science Department and… … Wikipedia