Computer security

Results: 47159



#Item
771Software / System software / Computer architecture / System administration / Secure Shell / Internet Standards / Unix / Cryptographic software / Filesystem Hierarchy Standard / Chroot / OpenSSH / Passwd

http://www.LinuxSecurity.com Security Glossary:

Add to Reading List

Source URL: en.tldp.org

Language: English - Date: 2000-09-18 13:37:46
772Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Secure, scalable collaboration solutions developed especially for organisations with the most demanding security requirements.

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2016-02-16 06:08:14
773Security / Cyberwarfare / Computer security / Computer network security / Cybercrime / E-commerce / Cryptography / National security / Online banking / Email / Identity theft / Malware

Microsoft Word - Sound Business PracticesBusinessesFinal042811

Add to Reading List

Source URL: www.nacha.org

Language: English
774Computing / Security / Multi-monitor / Video hardware / Video wall / Scalability / Computer security

utilities Cutting-edge Video Wall Technology Now Within Reach for Utilities of Any Size Purchasing and maintaining a video wall for a command

Add to Reading List

Source URL: hiperwall.com

Language: English - Date: 2015-10-21 18:16:35
775United States Department of Homeland Security / Government / United States intelligence agencies / National security / Safety / Infrastructure / Security engineering / Cyberwarfare / Critical infrastructure protection / United States Computer Emergency Readiness Team / DHS Office of Intelligence and Analysis / Risk management

Regional Overview of Critical Infrastructure Programs: Region Snapshots May 2016 i Introduction:

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-05-19 16:45:07
776Computing / Computer network security / Cyberwarfare / Computer security / Multi-agent systems / Spamming / Intrusion detection system / Malware / Computer virus / Botnet / Alert correlation / Infection

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-06-29 16:14:13
777Computing / Cyberwarfare / Computer security / Computer network security / E-commerce / Secure communication / Web application security / Automated threat / OWASP / Vulnerability / Application security / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-10-23 12:02:35
778Software / System software / Computer security / Antivirus software / Malwarebytes / Malware / Avira / Marcin Kleczynski / IObit

C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
779Microsoft / Software / Computer access control / Password / Security / Outlook.com / Login / VS/9

Microsoft Word - Facility Online Manager User Manual.doc

Add to Reading List

Source URL: rfom.ad.uky.edu

Language: English - Date: 2009-02-28 19:59:14
780Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:23:24
UPDATE