Computer security

Results: 47159



#Item
901Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Advanced Exploitation: Xen Hypervisor VM Escape Shangcong Luan May 27, 2016 Alibaba Cloud Platform Security Team

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 10:02:21
902Founder Bios Christian Bennefeld, Chief Executive Officer: Visionary and Corporate Developer Christian Bennefeld studied computer science and mathematics at the internationally renowned Technical University of Karlsruhe

Founder Bios Christian Bennefeld, Chief Executive Officer: Visionary and Corporate Developer Christian Bennefeld studied computer science and mathematics at the internationally renowned Technical University of Karlsruhe

Add to Reading List

Source URL: www.eblocker.com

Language: English - Date: 2015-12-23 10:53:28
903RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
904Mobilität und Leihpersonal als Security-Fallen:

Mobilität und Leihpersonal als Security-Fallen:

Add to Reading List

Source URL: mk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:20
905Texas Commission Panelist and Speaker Statements

Texas Commission Panelist and Speaker Statements

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2016-07-15 13:37:24
906Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
907ParentPaperwork Two Factor Authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
908Microsoft Word - Facility Security Plan Standard.doc

Microsoft Word - Facility Security Plan Standard.doc

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2013-02-19 08:45:20
909Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Distributed Independent Competitor Analysis and Access to Databases Encrypted Cloud Srikanth Bathini M.Tech, Dept of Computer Science Engineering, Prasad College of Engineering.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-04 01:33:45
910Technical Research Paper  Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server  Author:

Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author:

Add to Reading List

Source URL: www.webperformance.com

Language: English - Date: 2005-12-20 21:05:41