Cyberwarfare

Results: 11990



#Item
301Software / Computing / Security / Cybercrime / Cyberwarfare / First Amendment to the United States Constitution / Computer network security / Computer security / Cryptography / Internet censorship / Facebook / Freedom of speech in the United States

Microsoft WordMedia Institute Luncheon Remarks - APPROVED.docx

Add to Reading List

Source URL: www.mediainstitute.org

Language: English - Date: 2016-04-13 15:41:25
302Security / Cybercrime / National security / Cyberwarfare / Social networking service / Internet privacy / Privacy / Computer security

PHOTOGRAPHS AND IMAGES OF CHILDREN

Add to Reading List

Source URL: thecpsu.org.uk

Language: English - Date: 2013-07-01 15:55:39
303Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

Add to Reading List

Source URL: www.cstr.inf.ed.ac.uk

Language: English - Date: 2015-09-29 11:06:25
304Denial-of-service attacks / Cyberwarfare / Domain name system / Computing / Internet / Radio-frequency identification / Verisign / Internet Relay Chat / Denial-of-service attack / Software / Eve Online / .net

Online games developer CCP Games uses Verisign DDoS Protection Services to keep its award-winning products up and running. Leading online multiplayer game developer uses Verisign solution to combat DDoS attacks. An awar

Add to Reading List

Source URL: www.verisign.com

Language: English - Date: 2015-10-13 16:15:03
305Security / Parsippany-Troy Hills /  New Jersey / Hotel chains / Wyndham Worldwide / Cyberwarfare / Politics and technology / Wyndham Hotels & Resorts / Wyndham / Computer security / Internet privacy / Electronic Privacy Information Center / Esquire

Case: Document: Page: 1

Add to Reading List

Source URL: epic.org

Language: English - Date: 2015-08-24 11:00:45
306Software / Computing / Computer security / Computer network security / Cyberwarfare / Cloud computing / Cloud storage / OwnCloud / Application firewall / Fail2ban / Intrusion detection system / Denial-of-service attack

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
307Security / Cyberwarfare / Computing / Software testing / Computer network security / Computer security / Cryptography / National security / Coverity / Vulnerability / Klocwork

Press Release Security Concerns Strengthen Automated Test Tool Demand, According to New Research by VDC Continuing to advance software security capabilities is critical as consumers and businesses conduct more high-value

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:29
308Security / Computing / Computer security / Computer network security / Cryptography / Cyberwarfare / National security / Secure communication / Layered security / Mobile device management / Mobile workspace

Taking a Layered Approach to Securing Mobile Devices in the Enterprise When it comes to protecting enterprise data on mobile devices—whether it’s a phone, tablet or a laptop— you need to have layers of security in

Add to Reading List

Source URL: essentials.code42.com

Language: English - Date: 2016-07-16 06:38:47
309Security / Prevention / Safety / Cyberwarfare / Cybercrime / National security / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / Risk management / Phil Agcaoili / Phil Reitinger

UNIVERSITY OF CALIFORNIA, ACADEMIC SENATE BERKELEY • DAVIS • IRVINE • LOS ANGELES • MERCED • RIVERSIDE • SAN DIEGO • SAN FRANCISCO J. Daniel Hare Telephone: (

Add to Reading List

Source URL: senate.universityofcalifornia.edu

Language: English - Date: 2016-06-02 11:04:16
310Malware / Cyberwarfare / Rogue software / Scareware / Social engineering / Ransomware / Rogue security software / Computer virus / Rootkit / Antivirus software / Winwebsec / Hierarchical clustering

Exploiting Visual Appearance to Cluster and Detect Rogue Software Christian J. Dietrich1,3 , Christian Rossow1,2 , Norbert Pohlmann1 {dietrich|rossow|pohlmann}@internet-sicherheit.de 1

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:15:57
UPDATE