Computer security software

Results: 11097



#Item
21Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope: the scope of

Electronic Health Record Software Required Security Features and Recommendations for Technical Specifications of Single Source Contracts and RFI for the Behavioral Health Information Technology Grant Scope: the scope of

Add to Reading List

Source URL: www.fphny.org

Language: English - Date: 2016-04-29 15:58:09
22C A S E S T U DY  Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
23Journ. of Intell Prop 1 - March, 2016.pmd

Journ. of Intell Prop 1 - March, 2016.pmd

Add to Reading List

Source URL: cipo.gov.dm

Language: English - Date: 2016-04-18 15:39:09
24Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
25Software / Computer access control / Prevention / Access control / Password / Security / Login / Social engineering / WhatPulse / Features of the Opera web browser

Creating Communities in Digication Login to your Digication account ( http://www.laguardia.edu/eportfoliosso/ ). Click the “Click here” button to enter the login screen. Enter your login information. (See image 1.1)

Add to Reading List

Source URL: www.eportfolio.lagcc.cuny.edu

Language: English - Date: 2012-06-27 12:59:38
26REboot: Bootkits Revisited Bootkit Basics State of the art REboot

REboot: Bootkits Revisited Bootkit Basics State of the art REboot

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
27Wireshark User’s Guide - For Wireshark 2.1

Wireshark User’s Guide - For Wireshark 2.1

Add to Reading List

Source URL: 1.eu.dl.wireshark.org

Language: English - Date: 2016-08-24 08:57:07
28TEAL and ECOS Access Instructions for Educators

TEAL and ECOS Access Instructions for Educators

Add to Reading List

Source URL: secure.sbec.state.tx.us

Language: English - Date: 2016-07-18 07:17:46
29International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

International Conference Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification June 28-30, 2016 Espace du Centenaire, Maison de la RATP Paris, France

Add to Reading List

Source URL: conferences.ncl.ac.uk

Language: English - Date: 2016-03-07 04:22:54
30C A S E S T U DY  Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

C A S E S T U DY Imperial College gives malware a failing grade With Malwarebytes Anti-Malware for Business, the university proactively protects valuable intellectual property on thousands of PCs

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11