Computer security

Results: 47159



#Item
721Internet privacy / HTTP cookie / Privacy / Personally identifiable information / Computer security / Computing / Digital media

DFC Privacy Statement www.DesignForCommunication.com Design For Communication Privacy Statement The Design For Communication (DFC) is committed to protecting your privacy and developing

Add to Reading List

Source URL: www.designforcommunication.net

Language: English - Date: 2015-02-04 10:25:04
722Malware / Cyberwarfare / Computer security / Ransomware / Cybercrime / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 13:05:33
723Computing / Computer security / Cyberwarfare / Spyware / Mobile Malware / Hummingbad / Android / Google Play / Malware / Rootkit

From HummingBad to Worse NEW DETAILS AND AN IN-DEPTH ANALYSIS OF THE HUMMINGBAD ANDROID MALWARE CAMPAIGN For five months, Check Point mobile threat researchers had unprecedented, behind-thescenes access to a group of cyb

Add to Reading List

Source URL: blog.checkpoint.com

Language: English - Date: 2016-07-01 12:40:55
724Technology / Advanced driver assistance systems / Security / Vehicle telematics / Wireless networking / Global Positioning System / Autonomous cruise control system / Computer security / Vehicle-to-vehicle / Vehicular automation / Autonomous car

Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11

Add to Reading List

Source URL: utc.ices.cmu.edu

Language: English - Date: 2016-04-08 11:05:18
725Computing / Software / Network management / Information technology management / Internet Standards / Internet protocols / System administration / Computer systems / Syslog-ng / Syslog / Balabit / Logfile

syslog-ng Store Box PRODUCT DESCRIPTION CopyrightBalaBit IT Security All rights reserved.

Add to Reading List

Source URL: amministratore-di-sistema.it

Language: English - Date: 2014-05-07 13:40:47
726Security / Computer security / Cyberwarfare / Vulnerability / Web application firewall / Application security / Application firewall

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
727Computing / Prevention / Evaluation / Computer security / Security / Information technology management / Data security / IT risk management / Software assurance / Vulnerability / Application security / ISO/IEC 27000-series

Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager,

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2015-11-20 16:43:16
728Computer network security / Cyberwarfare / Computing / Firewall / DMZ / Information technology management

CyberGuard SG User Manual CyberGuard 7984 South Welby Park Drive #101 Salt Lake City, Utah 84084

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2004-09-08 01:37:57
729Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-22 08:29:01
730Computer security / Computer access control / Cryptography / Computing / Entrust / Security token / Datacard Group / Authentication / IEEE 802.1X / Smart card / Identity management / Electronic authentication

+entrust.com/enterprise Entrust IdentityGuard for Enterprise

Add to Reading List

Source URL: www.entrustdatacard.com

Language: English - Date: 2016-02-11 14:34:23
UPDATE