Cybersoft

Results: 60



#Item
41Pattern matching / Computer virus / Pattern recognition / Regular expression / Less / Pattern / MOD / Software engineering / Computing / Computer programming

Microsoft Word - pattern matching using vf.doc

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
42Unix / Special purpose file systems / System administration / Find / Searching / Repo / Filesystem Hierarchy Standard / Df / Procfs / Computing / Software / System software

Cybersoft.com CyberSoft White Papers Use of Avatarâ„¢ on a Honey Pot System By James A. Roach, Jr. CyberSoft, Inc.

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
43United States Department of Commerce / Export Control Classification Number / International trade / Technology / Cryptographic software / Key management / 56-bit encryption / Export / Cryptography / Security / Identifiers / Military technology

Federal Register / Vol. 67, No[removed]Thursday, June 6, [removed]Rules and Regulations Note 2: Information concerning the existence of approved alternative methods of compliance with this airworthiness directive, if any, m

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:10
44Unix / Cybersoft / Trojan horse / Internet / Operating system / Computer security / Rm / Email / Computing / Security / Computer virus

CURRICULUM VITA NAME: Dr. Abdelgadir Ahmed Osman (Associate professor) Date of birth: 1953 EDUCATION :

Add to Reading List

Source URL: www.sustech.edu

Language: English - Date: 2009-08-20 01:06:58
45Unix / Cybersoft / Trojan horse / Internet / Operating system / Computer security / Rm / Email / Computing / Security / Computer virus

Cybersoft.com CyberSoft White Papers VFIND, CIT: TAKE ON THE BARBARIANS ON THE OTHER SIDE OF THE WALL By Roger Harmston

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
46Computer security / Malware / Antivirus software / Rogue software / Computer virus / Spyware / Zero-day attack / Computer worm / Password / Cyberwarfare / System software / Computer network security

Peter V. Radatti Govsec 06 Presentation GOVSEC 2006 Government Security Expo & Conference April 26, 2006 Washington, D.C.

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
47C POSIX library / C programming language / Procedural programming languages / Computer file formats / Data types / ALGOL 68 / Pointer / C / Write / Computing / Software engineering / Computer programming

Cybersoft.com CyberSoft White Papers SmartScan Copyright © 2001 by CyberSoft, Incorporated. Permission is granted to any individual or institution to use, copy, or redistribute this documentation

Add to Reading List

Source URL: www.cybersoft.com

Language: English - Date: 2013-08-13 11:07:11
48

PDF Document

Add to Reading List

Source URL: www.cybersoft.com

- Date: 2013-08-13 11:07:10
    49

    PDF Document

    Add to Reading List

    Source URL: www.cybersoft.com

    - Date: 2013-08-13 11:07:10
      50Unix / Crypt / File system / Computer virus / Operating system / Microsoft Word / Software / System software / Antivirus software

      Cybersoft.com CyberSoft White Papers Special Attributes of the VFind Tool Kit Peter V. Radatti CyberSoft, Inc.

      Add to Reading List

      Source URL: www.cybersoft.com

      Language: English - Date: 2013-08-13 11:07:11
      UPDATE