Computer security software

Results: 11097



#Item
991Procedural programming languages / Cross-platform software / Technical communication / Macro / Source code / Information security / C / Scheme / Man page / Computing / Computer programming / Software engineering

Helmut Kurth atsec information security corp. 10th ICCC, Tromso - atsec information security tirsdag 1. september 2009

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2009-09-01 04:58:54
992Spyware / Antivirus software / Malware / Computer network security / Email / Backdoor / Spam / Phoning home / Windows Vista / Internet / Computing / Espionage

Microsoft Word - MitigationMonday_UNCLAS.doc

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 13:16:34
993Cyberwarfare / Crime prevention / National security / Data security / Software testing / Malware / Information security / Certified Information Systems Security Professional / Vulnerability / Security / Computer security / Computer network security

Security Specialist Summary: BATS, one of the largest U.S. equities market center, is actively seeking a Security Specialist. Location: New York, NY Responsibilities  

Add to Reading List

Source URL: cdn.batstrading.com

Language: English - Date: 2015-05-28 14:59:04
994Security / Hacking / Software testing / Full disclosure / Kloxo / Vulnerability / Stakeholder / Cross-site scripting / Countermeasure / Computer security / Cyberwarfare / Computer network security

Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research David Dittrich University of Washington Michael Bailey

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
995Access control / Computer security / User / Collaborative software / Authorization / Group / Operating system / Security / Identity management / Computing

A Group-based Authorization Model for Cooperative Systems Klaas Sikkel GMD-FIT, German National Research Center for Information Technology

Add to Reading List

Source URL: www.ecscw.org

Language: English - Date: 2006-12-04 08:09:23
996Email authentication / Ident / Internet Relay Chat / Computer network security / Skype / Firewall / Secure Shell / OpenFlow / Daemon / Software / Computing / Videotelephony

Delegating Network Security with More Information Jad Naous Ryan Stutsman Stanford University

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2009-07-22 15:07:11
997Cyberwarfare / Computing / Network security / Malware / Threat / Internet security / Webroot Internet Security Complete / Computer network security / Computer security / Webroot Software

FOR ENTERPRISE BrightCloud Security Services ® Protect your enterprise from a new breed of online threats

Add to Reading List

Source URL: www.brightcloud.com

Language: English - Date: 2014-06-19 12:09:22
998Computer vision / European Space Agency / Global Monitoring for Environment and Security / Remote sensing / Geography / GIS software / GIS applications / GMOSAIC / SAGA-EO Project / Geographic information systems / Space policy of the European Union / Spaceflight

2_Expertise_Profile_GMES_CC_ReSAC_Bulgaria

Add to Reading List

Source URL: gmes-bg.org

Language: English - Date: 2011-04-07 03:57:32
999Unix / Out-of-band / And–or tree / System software / Computing / Electronic engineering / Signaling / Password / Attack tree

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-11-28 06:37:33
1000Computer law / Credit cards / Data privacy / Computing / Payment Card Industry Data Security Standard / Password / PA-DSS / Information security / Network security / Payment systems / Security / Computer security

Wolf Track Software, Ltd. Implementation Guide PO BoxRiverland Drive #101 Crested Butte, CO 81224

Add to Reading List

Source URL: www.wolftrack.com

Language: English - Date: 2012-05-03 19:13:17
UPDATE