Computer insecurity

Results: 197



#Item
51ENDPOINT SECURITY  WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

ENDPOINT SECURITY WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

Add to Reading List

Source URL: containment.comodo.com

Language: English
52Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
53Cyberterrorism How Real Is the Threat?

Cyberterrorism How Real Is the Threat?

Add to Reading List

Source URL: www.usip.org

Language: English - Date: 2013-05-14 12:02:03
54Defence AgainstTerrorism Terrorism Review Defence Against Review

Defence AgainstTerrorism Terrorism Review Defence Against Review

Add to Reading List

Source URL: www.tmmm.tsk.tr

Language: English - Date: 2015-02-23 10:34:30
55TOP 10 where Security-OBLIGATED Executives should focus Introduction

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
56MULTIPLAYER ONLINE GAMES INSECURITY (NEVER FEEL SAFE WHILE PLAYING ONLINE )

MULTIPLAYER ONLINE GAMES INSECURITY (NEVER FEEL SAFE WHILE PLAYING ONLINE )

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
57THE RUSI JOURNAL  CYBER-WEAPONS Thomas Rid and Peter MCBurney  What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from

THE RUSI JOURNAL CYBER-WEAPONS Thomas Rid and Peter MCBurney What are cyber-weapons? Instruments of code-borne attack span a wide spectrum, from

Add to Reading List

Source URL: www.rusi.org

Language: English - Date: 2012-02-23 11:13:36
58A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University  {ang,sal}@cs.columbia.edu

A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Ang Cui and Salvatore J. Stolfo Department of Computer Science, Columbia University {ang,sal}@cs.columbia.edu

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
59Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa

Evaluation of Risk for Complex Systems Using Attack Surface Leanid Krautsevich, Fabio Martinelli and Artsiom Yautsiukhin The Institute of Informatics and Telematics of The National Research Council Via G. Moruzzi 1, Pisa

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2015-04-02 07:11:50
60Three Tips on Preventing USB Insecurity in Your Organization With great advantages come great responsibilities. The usefulness of USB devices has made them indispensible to most of us today. However, the ease with which

Three Tips on Preventing USB Insecurity in Your Organization With great advantages come great responsibilities. The usefulness of USB devices has made them indispensible to most of us today. However, the ease with which

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-23 09:10:44