Big Data & Security. Edgar Weippl SBA Research
|
|
- Ross Simmons
- 8 years ago
- Views:
Transcription
1 Big Data & Security Edgar Weippl SBA Research
2 Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability on infrastructure Complex and hidden dependability Integrity incomplete data, entry errors, processing, sensors, social media, latency of information, deception, modeling approximations,
3 Privacy won t work 1. My data should not have an impact on the results released. 2. One should learn nothing about me. Ad 1) then the results have no utility. Ad 2) even if you do share your data, the trend is true for you.
4 Privacy that might work Weaker assumption: Differential Privacy Given result R can anyone guess which possible world it came from? Result R Prob (R) = A A B Prob (R) = B Possible world with MY data Possible world without my data
5 Risks Small Data Intake Age Total Priors Gender Race Source: Richard Berk, The Role of Race in Forecasts of Violent Crime, Race Soc. Probl. Dec 2009; 1(4): , DOI /s z pdf
6 Future Attribute Screening Technology (FAST) Crimethink - Facecrime Science-fiction concept of 'pre-crime', in which security services can detect someone's intention to commit a crime. DHS has claimed accuracy rates of around 70%. Really? Minority Report Source: Sharon Weinberger, Terrorist 'precrime' detector field tested in United States, online 27 May 2011, Nature, doi: /news
7 Looking for terrorists Let s assume we have an analysis tool with 98 % sensitivity and 99% specificity. Our software flags a person as a possible terrorists. Heavily armed you enter the apartment. How likely is that you really have a terrorist looking into barrel of your gun? a. 98 % (sensitivity)? b. 99 % (specificity)? c. None of the above? ~ 100 / ~ 1 /
8 Statistics refresher 500 Mio people 100 terrorists innocent people 2 terrorists are not found 98 terrorists are found Approx. 5 Mio innocent people are interrogated by police They were lucky
9 This will never happen Auffällig sei der Gebrauch von Fachbegriffen wie Gentrifizierung, heißt es in den Akten. An jenem Sommertag vor einem Jahr ist es schon morgens um 7 Uhr sehr warm. Holm läuft halbnackt durch die Wohnung, als Polizisten mit gezogenen Waffen hereinstürmen und ihn zu Boden werfen. Source: Hannes Heine, Man weiß jetzt, was Gentrifizierung ist, Der Tagesspiegel Berlin, ,
10 Ever think you re being watched? It isn t the consumers job to know what they want. Source: Steve Lohr, Can Apple Find More Hits Without Its Tastemaker? The New York Times, Jan 18, 2011 Market research is very good at determining consumer preferences among products that currently exist. Source: Peter Noel Murray, How Steve Jobs Knew What You Wanted, Psychology Today, Oct 13, 2011,
11 WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012),
12 Man-in-the-Middle
13 CERTIFICATES?
14
15 Authentication
16
17
18 In Reality
19 Even Worse Code = Hi!
20 Completely Stealthy
21 WowTalk
22 Status Messages
23
24
25 iphone/u.php?cc=countrycode&me=p honenumber&s=statusmessage
26 Enumeration Attack
27 Enumeration Attack
28 Enumeration Attack
29 On vacation Sleeping At work... Bleh. Missing my love! Heartbroken Nicaragua in 4 days!! On my way to Ireland at work but not doing shit I m never drinking again
30
31 WhatsApp ebuddy XMS WowTalk Viber HeyTell Forfone Voypi Tango EasyTalk
32 Results
33 Contact Edgar Weippl
Cloud Security and Mobile Applica4on Security
2/22/13 Cloud Security and Mobile Applica4on Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security
More informationCloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl
Cloud Security and Mobile Application Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security but no
More informationEHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.
EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research
More informationObserva(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems
17/03/15 Advanced Persistent Threats & Social Engineering SBA Research & Vienna University of Technology Edgar R. Weippl Observa(on & Empirical Research Observa(on of complex systems 1 Impact Real- World
More informationGuess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications
Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl
More informationGuess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications
Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl
More informationWelcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015
Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)
More informationRe-evaluating Smartphone Messaging Application Security
Re-evaluating Smartphone Messaging Application Security Robin Müller University of Technology Vienna, Austria robin.m@gmx.at Abstract During the last two years mobile messaging and VoIP applications for
More informationSBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity
SBA Research Angewandte Forschung Angewandtes Wissen SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how
More information3 rd Young Researcher s Day 2013
Einladung zum 3 rd Young Researcher s Day 2013 Nach zwei erfolgreichen Young Researcher s Days starten wir kurz vor dem Sommer in Runde drei. Frau Ingrid Schaumüller-Bichl und Herr Edgar Weippl laden ganz
More informationI Textarbeit. Text 1. I never leave my horse
BEJ Musterprüfung Englisch (11020) 1 I Textarbeit Text 1 I never leave my horse 1 5 10 15 20 Police officers in Ireland don t carry guns. But they often ride through Dublin on horses. Julie Folan is a
More informationSpoiled Onions: Exposing Malicious Tor Exit Relays
Spoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl Outline This talk is about: Detecting
More informationAppInspect: Large-scale Evaluation of Social Networking Apps
AppInspect: Large-scale Evaluation of Social Networking Apps ACM COSN, Boston, 10/08/2013 Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl mhuber[at]sba-research[dot]org Main Contributions
More informationIs Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins
Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel
More informationCS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?
CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related
More informationGETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING
GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING Dr. Tobias Hildenbrand & Christian Suessenbach, SAP AG Entwicklertag Karlsruhe, 22 May 2014 Ich wollte Mitarbeiter so motivieren,
More informationModerne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland
Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland Network Security History in a Nutshell 1990s The Internet is bad if we do
More informationRadio D Teil 1. Deutsch lernen und unterrichten Arbeitsmaterialien. Episode 01 A Visit to the Countryside
Episode 01 A Visit to the Countryside, a young man, drives to the countryside to visit his mother Hanne. He plans to relax there, but soon finds out that the idyllic country landscape has its downsides
More informationOrganizational Details Summer 2015
Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research Cooperation for all security
More informationquick documentation Die Parameter der Installation sind in diesem Artikel zu finden:
quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro
More informationOnline Rumors. Lauren didn t think much of it when a classmate came. Lauren didn t have to ask where on the Internet;
Carol Adams Huntington Junior College Literary Material Marked in 20 Word Groups Online Rumors Lauren didn t think much of it when a classmate came into the band hall and said, Hey, Lauren, did you 1 hear
More informationAll the English here is taken from students work, both written and spoken. Can you spot the errors and correct them?
Grammar Tasks This is a set of tasks for use in the Basic Grammar Class. Although they only really make sense when used with the other materials from the course, you can use them as a quick test as the
More informationLernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone
Fachkunde 1, Lernfeld 2, Useful Office Vocabulary Lernsituation 9 Giving information on the phone Rolf astian, Managing Director of E Partners KG, recently visited the Promo World Fair in Düsseldorf, an
More informationSearch Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann
Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation
More informationAnalytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft
Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft Oliver Börner Thomas Thalhammer 1 / digital business by 2 / digital business by 3 / digital business by 4
More informationWhat s going on with iphone touch performance?
What s going on with iphone touch performance? - A performance comparison between Apple iphone 5S and iphone 5C Apple released two new iphones to market few weeks ago, the new flag ship model 5S and the
More information2016 ABFF STAR PROJECT MONOLOGUE CHOICES
2016 ABFF STAR PROJECT MONOLOGUE CHOICES Hard Deadline: February 1, 2016 SELF-TAPE INSTRUCTION TIPS Submission period: December 14, 2015 February 1, 2016 The Star Project is sponsored by NBCUniversal,
More informationForensic Acquisition and Analysis of Tango VoIP
Forensic Acquisition and Analysis of Tango VoIP Nhien-An Le-Khac*, Christos Sgaras, and M-Tahar Kechadi School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland.
More information2012 NCSA / McAfee Online Safety Survey
2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security
More informationMUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL
MUK-IT 63. Roundtable Herzlich Willkommen bei der Software AG Anton Hofmeier VP Sales Terracotta DACH / MdGL Überblick February 15, 2013 2 Software AG www.softwareag.com 5.500 Mitarbeiter >1Mrd Umsatz
More informationBei Fragen zu dieser Änderung wenden Sie sich bitte an Ihren Kundenbetreuer, der Ihnen gerne weiterhilft.
FIL Investment Management (Luxembourg) S.A. 2a rue Albert Borschette, L-1246 B.P. 2174, L-1021 Luxembourg Tél: +352 250 404 1 Fax: +352 26 38 39 38 R.C.S. Luxembourg B 88635 Dezember 2014 Wichtige Ankündigung:
More informationMicrosoft Azure. Die "Hyper-Scale" Cloudplattform. Gerwald Oberleitner 22. September 2015
Microsoft Azure Die "Hyper-Scale" Cloudplattform Gerwald Oberleitner 22. September 2015 Wie sich Microsoft Hyper-scale Azure differenziert Enterprise Grade Hybrid Azure footprint Azure footprint Datacenter
More informationVarieties of specification and underspecification: A view from semantics
Varieties of specification and underspecification: A view from semantics Torgrim Solstad D1/B4 SFB meeting on long-term goals June 29th, 2009 The technique of underspecification I Presupposed: in semantics,
More informationThomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland SAPS. Statistically Assisted Program Selection
Thomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland Slide 1 SAPS Statistically Assisted Program Selection A Targeting System of Swiss Active Labor Market Policies (ALMPs) Slide
More informationBig Data for Social Good. Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research
Big Data for Social Good Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research 6.8 billion subscriptions 96% of world s population (ITU) Mobile penetration of 120%
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationIs Privacy A Cloud Illusion? Five Hidden Facts You Need to Know
Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know 2014 StoAmigo. The information contained within these marketing materials is strictly for illustrative purposes, and the figures herein are
More informationNetwork and device forensic analysis of Android social- messaging applica=ons
Network and device forensic analysis of Android social- messaging applica=ons Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Brei=nger Graduate Research Assistant, UNHcFREG Member
More informationAdaptive Business Intelligence
Adaptive Business Intelligence Bearbeitet von Zbigniew Michalewicz, Martin Schmidt, Matthew Michalewicz, Constantin Chiriac 1. Auflage 2006. Buch. xiii, 246 S. Hardcover ISBN 978 3 540 32928 2 Format (B
More informationEnterprise Mobility Changing the way of doing business
Enterprise Mobility Changing the way of doing business Wolfgang Kuzel Business Development Manager Tieto Austria Gmbh E-mail: wolfgang.kuzel@tieto.com 2013 Tieto Corporation We already have mobile solutions
More informationFormal Methods and the Internet of Things
Formal Methods and the Internet of Things Definition of an Internet-of-Things-Platform and its reference implementation in conjunction with an exemplary usage of Formal Methods. Bachelor thesis Heinrich
More informationExemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange
Exemplar for internal assessment resource German 1.5A for Achievement Standard 90887! Exemplar for Internal Assessment Resource German Level 1 Resource title: Planning a School Exchange This exemplar supports
More informationEmbedded Software Development and Test in 2011 using a mini- HIL approach
Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des
More informationThe Digital Divide: How the Online Behavior of Teens is Getting Past Parents
June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents
More informationThinking Cloud Services Look Before You Leap
Thinking Cloud Services Look Before You Leap Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Friday, March 16, 2012 Session 10358 Preamble Cloud security literature consistently boils
More informationProduct Availability List Graphic Arts Film Products. September 2007 (version 3.0)
Product Availability List Graphic Arts Film Products September 2007 (version 3.0) Krauchthal, September 2007 Dear business partner, As usual at this time of the year our film availability list has been
More informationTRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS
Illustration: alengo/getty Images TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS Smart Cities PRIVACY SECURITY TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED
More informationIoT - Wie die Flut an Daten nutzbar wird
IoT - Wie die Flut an Daten nutzbar wird Maik Jordt Sales Director, DACH November 2014 IoT eine Standortbestimmung Maik Jordt, MapR Technologies 2 Was ist IoT? Das Internet der Dinge (auch englisch Internet
More informationA. Arguments are made up of statements, which can be either true or false. Which of the following are statements?
Critical Thinking University of St Andrews March 2007 Bullet point material is not on the students copies. Feel free to use the material as you see fit, depending on timing, ability, enthusiasm etc. Good
More informationGreat Books: Tales of Edgar Allan Poe Teacher s Guide
Teacher s Guide Grade Level: 9-12 Curriculum Focus: Literature Lesson Duration: 1 2 class periods Program Description Explore the psychology of terror in some of Poe s most-haunting tales. Interwoven through
More informationDATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used.
Data is the new Oil DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used. Clive Humby "Digitale Informationsspeicher Im Meer der Daten" "Die Menschen produzieren immer mehr
More informationQuantified Self: Analyzing the Big Data of our Daily Life. Andreas Schreiber <Andreas.Schreiber@dlr.de> PyData Berlin 2014
DLR.de Chart 1 Quantified Self: Analyzing the Big Data of our Daily Life Andreas Schreiber PyData Berlin 2014 DLR.de Chart 2 Introduction Scientist, Head of department Co-Founder,
More informationCan we save our online freedom?
Can we save our online freedom? Jaap-Henk Hoepman TNO, Groningen, the Netherlands jaap-henk.hoepman@tno.nl Digital Security (DS) Radboud University Nijmegen, the Netherlands jhh@cs.ru.nl / www.cs.ru.nl/~jhh
More informationlanguage-related erp components: n400
language-related erp components: n400 Based on Luck & Kappenmann (2012) and Kutas & Federmeier (2011) Alina Karakanta, Max Paulus 19.11.2015, Supervisor: Sahri Morbey Saarland University Kutas & Hillyard
More informationstrategies and actions for flood emergency risk management Projektkoordinatorin Anne Kolega Regierungspräsidium Stuttgart Contents of this presentation Background of the project Dates, costs and grant
More informationMachine Learning for natural language processing
Machine Learning for natural language processing Introduction Laura Kallmeyer Heinrich-Heine-Universität Düsseldorf Summer 2016 1 / 13 Introduction Goal of machine learning: Automatically learn how to
More informationMUSTER. ENGLISH G 21/D3 Test No. 1 Unit 1: My London. 1 LISTENING The London Eye. G - Level: Listen to three texts and tick the correct box.
Name: Date: 1 LISTENING The London Eye G - Level: Listen to three texts and tick the correct box. Right Wrong 1 can buy tickets for the London Eye at the ticket office. 2 The ticket office opens at 10.00
More informationHow to Use the California Identity Theft Registry
How to Use the California Identity Theft Registry A Guide for Victims of Criminal Identity Theft Tips for Consumers Consumer Information Sheet 8 June 2014 What Is Criminal Identity Theft?...1 How You May
More informationWelcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network
More informationIdentity Theft and Data Management Public Records Are Not the Problem
Identity Theft and Data Management Public Records Are Not the Problem Richard J. H. Varn Coalition for Sensible Public Records Access (CSPRA) 1 Overview of Key Points Un-validated, single factor authentication
More informationUncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
More informationMobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
More informationinfo@healthcarefuturists.com
Big Data in Health-Care als Innovationstreiber Von in-vitro-diagnostik zu in-algorithmo-diagnostik Dr. med. Tobias D. Gantner, MBA, LL. M. HealthCare Futurists GmbH 09.12.2015 1 Berlin, 9.12.2015 Big Data
More informationSOOKASA WHITEPAPER CASB SECURITY OVERVIEW. www.sookasa.com
SOOKASA WHITEPAPER CASB SECURITY OVERVIEW www.sookasa.com Sookasa Overview Nearly 90 percent of enterprises currently use the public cloud, and by 2020, practically every business across the country is
More informationWhereas I was Blind, Now I See. John 9: 1-11; 25
Whereas I was Blind, Now I See John 9: 1-11; 25 We all know that great hymn well: Amazing grace, how sweet the sound, that saved a wretch like me; I once was lost, but now I m found; was blind, but now
More informationHome Invasion Safety. Protecting Your Family
Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other
More informationBMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software
BMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software Agenda BMC DB2 Entwicklungsstrategie Performance Advisor Update Copyright 5/17/2010 BMC Software, Inc 2 General Development
More informationPost-Traumatic Stress Disorder
Post-Traumatic Stress Disorder It s natural to be afraid when you re in danger. It s natural to be upset when something bad happens to you or someone you know. But if you feel afraid and upset weeks or
More informationVocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
More informationSymantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
More informationProgrammieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009)
Programmieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009) In diesem Dokument werden die Programmierschnittstellen aufgeführt, mit deren Hilfe Entwickler Anwendungen unter Verwendung von
More informationDAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software
DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING SEPTEMBER 2015 Wir verkaufen nur Original-Microsoft
More informationThe Basics of Building Credit
The Basics of Building Credit This program was developed to help middle school students learn the basics of building credit. At the end of this lesson, you should know about all of the Key Topics below:»
More informationSelecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns
Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the
More informationFrom Epistemology to Praxis in Translator Education: A Moodle-Based Project. Don Kiraly University of Mainz
From Epistemology to Praxis in Translator Education: A Moodle-Based Project Don Kiraly University of Mainz A place for learning? The Schoolmaster (A. van Ostade 1662) A better place for learning? (Somewhere
More informationThe 20/20 Club Training Manual
The 20/20 Club Training Manual The purpose of this manual is to help each 20 Club Member in Profit Leads to build their business. Below I will go over how to contact Business Opportunity Seekers and Network
More informationDeduplication as security issue in cloud services, and its representation in Terms of Service Agreements
Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,
More informationDigital Citizenship Lesson Plan
Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship
More informationFACTS & FIGURES AUGUST 2013
AUGUST 2013 WHAT THE MARKET SAYS ABOUT AUGMENTED REALITY 1. INTRODUCTION At Layar we measure everything that we do and our customers can measure everything that they do. We use these insights to continuously
More informationRUNNING HEAD: Drunk Driving Harrawood 1
RUNNING HEAD: Drunk Driving Harrawood 1 Community Problem Report on Drunk Driving in El Paso Erika Harrawood ENGL 1311 Drunk Driving Harrawood 2 Community Problem Report It is said that El Paso is one
More informationIs it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data
Is it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data Heard on Sand Hill Road It s all going into the cloud in the next two years Enterprises don t want to manage their own storage
More informationFor those of you keen to have a written version on the podcast, here is the script below:
German Language Guide Script For those of you keen to have a written version on the podcast, here is the script below: Anna: Vorsicht! Scott: Oh sorry! Do you speak English it s kinda squashed in here,
More informationChapter 1 Introduction to Correlation
Chapter 1 Introduction to Correlation Suppose that you woke up one morning and discovered that you had been given the gift of being able to predict the future. Suddenly, you found yourself able to predict,
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationKnow your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?
Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved. Customer Presentation
1 SAM, NFS und SMB Dirk Nitschke Principal Sales Consultant SAM-QFS 5.3.2 / 5.3.9 Unterstützung neuer Geräte LTO-5, LTO-6, T10000-C, SL150, ACSLS 8 Unterstützung neuer Betriebssystemversionen Solaris 11,
More informationWir stellen uns vor We introduce ourselves
Wir stellen uns vor We introduce ourselves Wir bieten Ihnen ein umfassendes Spektrum an Dienstleistungen in der Nukleartechnik. Dabei setzen wir unsere langjфhrige Erfahrung und unser umfassendes Know-how
More informationThe Five W's of SOC Operations. Kevin Young, @IT3700
The Five W's of SOC Operations Kevin Young, @IT3700 Thank you Todd Thanks to Randall Munroe https://xkcd.com/838/ Overview Introduction Five W s of SOC Operations When do I need a SOC? Readiness What exactly
More informationPavlo Baron. Big Data and CDN
Pavlo Baron Big Data and CDN Pavlo Baron www.pbit.org pb@pbit.org @pavlobaron What is Big Data Big Data describes datasets that grow so large that they become awkward to work with using on-hand database
More informationGreen Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings
Green Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings Speaker: Erwin Nolde, Berlin email: mail@nolde-partner.de Wasserforum für f r die EMA-Region 11. und 12. März
More informationStatistical Methods for Network and Computer Security p.1/43
Statistical Methods for Network and Computer Security David J. Marchette marchettedj@nswc.navy.mil Naval Surface Warfare Center Code B10 Statistical Methods for Network and Computer Security p.1/43 A Few
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationCoffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15
Coffee Break German Lesson 03 Study Notes Coffee Break German: Lesson 03 - Notes page 1 of 15 LESSON NOTES ICH KOMME AUS DEUTSCHLAND. UND SIE? In this lesson of Coffee Break German we will learn to talk
More informationSermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014
1 How many of you have your Be a Blessing stones with you from last week? For those of you who weren t here, these stones are to remind us of the promise that God made to Abraham when he was called to
More informationBiometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
More informationHitachi inverter user manual
Hitachi inverter user manual Epson px700w printer manual.honda nc700x service manual.45381801086 - Hitachi inverter user manual.manual for epson stylus nx430.der Tag der ersten erlaubten Г ffentlichen
More informationIrvine Police Victim Advocate s Office 949-724-7274
Irvine Police Victim Advocate s Office 9497247274 View this Resource Guide online at www.cityofirvine.org/pd/info_center/victim_service.asp 1 Irvine Police Victim Advocate s Office 9497247274 1 Irvine
More informationFOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN. Monday, June 18, 2001 9:15 a.m. SCORING KEY
FOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN Monday, June 18, 2001 9:15 a.m. SCORING KEY Mechanics of Rating Use only red ink or red pencil in rating proficiency examination papers.
More informationElena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna)
Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) VII Conference on Legal Translation, Court Interpreting and Comparative Legilinguistics Poznań, 28-30.06.2013
More informationEnhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security
More information