Computer security

Results: 47159



#Item
791Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Introducing the CrySyS Lab Levente Buttyán Laboratory of Cryptography and System Security (CrySyS Lab) Department of Networked Systems and Services Budapest University of Technology and Economics www.crysys.hu

Add to Reading List

Source URL: www.crysys.hu

Language: English - Date: 2016-07-26 04:36:44
792C A S E S T U DY  Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

C A S E S T U DY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-06 12:41:45
793pwc_master_logo_shortform

pwc_master_logo_shortform

Add to Reading List

Source URL: www1.pwc.ch

Language: English - Date: 2016-07-04 03:06:01
794ReportThreats Predictions By McAfee® Labs™

ReportThreats Predictions By McAfee® Labs™

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:00:32
795Zemana AntiLogger You need smarter protection against the bad guys who are trying to steal your financial credentials, gain access to your private online accounts and even your identity.  What 

Zemana AntiLogger You need smarter protection against the bad guys who are trying to steal your financial credentials, gain access to your private online accounts and even your identity. What 

Add to Reading List

Source URL: dl9.zemana.com

Language: English - Date: 2016-08-16 09:29:59
796A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences)  J¨orn Loviscach∗

A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences) J¨orn Loviscach∗

Add to Reading List

Source URL: www.j3l7h.de

Language: English - Date: 2009-08-23 13:49:42
797Summary: the NSF Workshop on Formal Methods for Security Stephen Chong Joshua Guttman

Summary: the NSF Workshop on Formal Methods for Security Stephen Chong Joshua Guttman

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2016-08-02 20:31:35
798Computer access control / Computer security / Security / Authentication / Login / User / Password

Notice 3 Dear Students, If your quota has been exceeded please use this temporary credentials as per the below username :cstd Password :Gust@#2016 ----------------------

Add to Reading List

Source URL: courseweb.sliit.lk

Language: English - Date: 2016-08-12 02:51:55
799Privacy Statement Coldwell Banker The Property Shoppe Real Estate Brokerage Last modifiedColdwell Banker The Property Shoppe Real Estate Brokerage is an independently owned and

Privacy Statement Coldwell Banker The Property Shoppe Real Estate Brokerage Last modifiedColdwell Banker The Property Shoppe Real Estate Brokerage is an independently owned and

Add to Reading List

Source URL: www.pecoldwell.com

Language: English - Date: 2012-04-11 08:54:53
800Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:58