Computer insecurity

Results: 197



#Item
91TOP 10 where Security-OBLIGATED Executives should focus Introduction

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
92New Era of ‘Mega Breaches’ Signals Bigger Payouts and Shifting Behavior for Cybercriminals Symantec Report Reveals the Number of Mega Data Breaches went from 1 in 2012 to 8 in 2013; 552 Million Identities Exposed in

New Era of ‘Mega Breaches’ Signals Bigger Payouts and Shifting Behavior for Cybercriminals Symantec Report Reveals the Number of Mega Data Breaches went from 1 in 2012 to 8 in 2013; 552 Million Identities Exposed in

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:44
93Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
94Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
95Executive Summary  Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Executive Summary Hacking the Human Operating System Raj Samani, EMEA CTO Charles McFarland, Senior MTIS Research Engineer

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:53
96Microsoft Word - CT425rev.doc

Microsoft Word - CT425rev.doc

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-03-03 19:33:34
97INSECURITY IN SECURITY SOFTWARE MORGENSTERN ET AL.  INSECURITY IN SECURITY SOFTWARE Maik Morgenstern AV-Test GmbH, Klewitzstr. 7, 39112 Magdeburg,

INSECURITY IN SECURITY SOFTWARE MORGENSTERN ET AL. INSECURITY IN SECURITY SOFTWARE Maik Morgenstern AV-Test GmbH, Klewitzstr. 7, 39112 Magdeburg,

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
98TRENDS FOR 2015 TARGETING THE CORPORATE WORLD PASSWORD S SSWORD ********

TRENDS FOR 2015 TARGETING THE CORPORATE WORLD PASSWORD S SSWORD ********

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2015-02-05 05:44:34
99Insecurity in Security Software Maik Morgenstern Andreas Marx AV-Test GmbH http://www.av-test.org

Insecurity in Security Software Maik Morgenstern Andreas Marx AV-Test GmbH http://www.av-test.org

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
100IFP/WKP/FGS[removed]MULTI-DISCIPLINARY ISSUES INTERNATIONAL FUTURES PROGRAMME  OECD/IFP Project on

IFP/WKP/FGS[removed]MULTI-DISCIPLINARY ISSUES INTERNATIONAL FUTURES PROGRAMME OECD/IFP Project on

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:22:42