Computer Weekly

Results: 134



#Item
31Keyword cipher / Four-square cipher / Computer programming / Computing / Software engineering

THE ECONOMIC WEEKLY August 20, 1960 From the Chair

Add to Reading List

Source URL: www.epw.in

Language: English - Date: 2015-03-04 07:14:35
32Computer network security / Crime prevention / National security / Tenable Network Security / Hacking / Nessus / Vulnerability scanner / Vulnerability / Information security / Computer security / Security / Cyberwarfare

| CASE STUDY OÖ.LKUF Austria Vulnerability Analytics with New Strengths From fast, but weekly reporting scanners to an automated, cost-saving enterprise solution:

Add to Reading List

Source URL: www.tenable.com

Language: English - Date: 2013-08-22 14:26:59
33Electronics / Headset / Plantronics / Cisco TelePresence / Cisco Systems / WebEx / Softphone / Telepresence / Digital Enhanced Cordless Telecommunications / Videotelephony / Electronic engineering / Computer-mediated communication

See Eye to Eye from Anywhere Plantronics and Cisco bring remote team members together USE CASE CHALLENGE: Three stakeholders who work in different cities are required to collaborate as a close-knit team on weekly project

Add to Reading List

Source URL: www.plantronics.com

Language: English - Date: 2014-11-26 16:59:43
34Drinking games / Parties / CUPS / Computer printing / Software

How Many Vegetables Are Needed Daily or Weekly? The amount of vegetables you need to eat depends on your age, sex, and level of physical activity. Recommended total daily amounts are shown in the first chart. Recommended

Add to Reading List

Source URL: choosemyplate.gov

Language: English - Date: 2015-01-14 12:18:53
35Drinking games / Parties / CUPS / Computer printing / Software

How Many Vegetables Are Needed Daily or Weekly? The amount of vegetables you need to eat depends on your age, sex, and level of physical activity. Recommended total daily amounts are shown in the first chart. Recommended

Add to Reading List

Source URL: www.choosemyplate.gov

Language: English - Date: 2015-01-14 12:18:53
36System software / Malware / Computer crimes / Denial-of-service attack / Symantec / F-Secure / Keystroke logging / Antivirus software / Computer security / Cyberwarfare

C-SAWR 026 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-07-25 06:52:07
37Computer network security / Advanced persistent threat / Ransomware / Threat / Espionage / Computer security / Cyberwarfare / Malware

C-SAWR 022 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-26 06:53:28
38Social engineering / Computer security / Computer crimes / Malware / FireEye /  Inc. / Botnets / Phishing / Zeus / Advanced persistent threat / Cybercrime / Spamming / Computing

[TLP WHITE] C-SAWR 030 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full produc

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-08-21 12:05:06
39Computer network security / Multi-agent systems / Botnets / Malware / Zeus / Email spam / Spam / Computer virus / Computing / Spamming / Internet

C-SAWR 027 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-08-01 08:01:36
40Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Rootkits / Zeus / Malware / Trojan horse / Trusteer / Computing / Botnets / Computer security

C-SAWR 021 [Extract] This is an extract of the Cyber-security Information Sharing Partnership (CiSP) Situational Awareness Weekly Report (C-SAWR). CiSP members automatically receive access to the full product as well as

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-06-20 03:51:09
UPDATE