Defensive computing

Results: 75



#Item
1Shooting sports / Sports / Practical shooting / USPSA / International Defensive Pistol Association / Army Marksmanship Unit / Email / Gmail / Computing

2016 US ARMY MARKSMANSHIP UNIT ACTION SHOOTING JUNIOR CLINIC OCTOBER 21 – OCTOBER 23, 2016 KRILLING RANGE FORT BENNING, GA

Add to Reading List

Source URL: www.usaac.army.mil

Language: English - Date: 2016-08-19 08:41:46
2Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
3Computer network security / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Computer security / Computing / Software / Defensive computing / Sumter County Library /  FL

Internet Access Policy Adopted by the Library Board Of Trustees Effective: March 17, 2015

Add to Reading List

Source URL: www.myepl.org

Language: English - Date: 2015-03-20 14:17:59
4Software / System software / Computing / Motorola / Consumer electronics / Cross-platform software / Nmap / IDEN / Chumby / Forensic science / Internet

Offensive  &  Defensive  &  Forensic   Techniques  for  Determining  Web   User  IdenAdd to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2013-11-04 07:37:56
5Grid computing / GLite / Middleware / Vulnerability / Voms / Secure coding / Defensive programming / Computing / Computer security / Cyberwarfare

Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-11-01 12:06:00
6National security / Network security / Cyberwarfare / Computer security / Password / Public safety / Information security / Defensive computing / Computer network security / Security / Crime prevention

Computer Account Agreement This agreement, the Computing Ethics Statement, and Web Guidelines which can be found in the student, faculty, and administrative handbooks, set forth the conditions of use for all University c

Add to Reading List

Source URL: www.utbildning.fysik.lu.se

Language: English - Date: 2013-11-01 08:09:41
7Antivirus software / Computer network security / Rogue software / Spyware / Scareware / Norton Internet Security / Computer virus / Internet security / Defensive computing / Malware / System software / Espionage

IndyLaptops Customer Care Document: V/S/MN. College Ave. Suite 1 ● Indianapolis, IN 46280 ● ● www.IndyLaptops.com Welcome To Different. Welcome to IndyLaptops. Steps to Help Protect Your Comput

Add to Reading List

Source URL: www.indylaptops.com

Language: English - Date: 2012-07-19 02:13:46
8Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
9Social engineering / Malware / Phishing / Keystroke logging / Email spam / Defensive computing / Web threat / Cybercrime / Computer crimes / Spamming

Microsoft WordMSF Security Alert - Tasmanians targeted by email scam.docx

Add to Reading List

Source URL: mystate.com.au

Language: English - Date: 2014-04-04 00:52:29
10Software / Computer crimes / Malware / Phishing / Norton Internet Security / Defensive computing / Antivirus software / System software / Cybercrime

FBI Warns Against Malware Installed Via Hotel Networks Malware poses as fake update of popular software. The FBI has warned travelers against fake software updates served through hotel connections, which actually attempt

Add to Reading List

Source URL: www.getadvanced.net

Language: English - Date: 2012-06-26 10:09:55
UPDATE