Defensive computing

Results: 75



#Item
21Wouldn’t it be Nice …?  secure enough for Paul E. Black secure enough

Wouldn’t it be Nice …? secure enough for Paul E. Black secure enough

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-15 07:43:19
22Microsoft Word - Drive-by Downloads.docx

Microsoft Word - Drive-by Downloads.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:47:49
23   Information Security Animations – Network and Communication Security (I) (Script)  Network and Communication Security (I)

  Information Security Animations – Network and Communication Security (I) (Script) Network and Communication Security (I)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-02-24 20:59:08
24   Information Security Animations – Network and Communication Security (I) (Script)  Network and Communication Security (I)

  Information Security Animations – Network and Communication Security (I) (Script) Network and Communication Security (I)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:27
25seniors online security  Computer Security 1 of 5 training guides available  An Australian Government Initiative

seniors online security Computer Security 1 of 5 training guides available An Australian Government Initiative

Add to Reading List

Source URL: www.scamnet.wa.gov.au

Language: English - Date: 2014-07-16 00:16:18
26Conducting Defensive Information Warfare on Open Platforms 23rd October 2013 – LinuxCon Europe Ben Tullis – (formerly of) LinuxIT (Europe) Ltd.

Conducting Defensive Information Warfare on Open Platforms 23rd October 2013 – LinuxCon Europe Ben Tullis – (formerly of) LinuxIT (Europe) Ltd.

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2013-10-19 16:33:05
27Internet / Internet privacy / Network service / Privacy / Defensive computing / Network security / Computing / Email / Ethics

PS No. 65 Effective: June 8, 1998 (Revised) Page 5 of 7 ________________________________________________________________

Add to Reading List

Source URL: web.lsue.edu

Language: English - Date: 2013-09-12 14:41:00
28SHIELDS UP!  DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

SHIELDS UP! DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

Add to Reading List

Source URL: www.jeremybytes.com

Language: English - Date: 2014-04-07 16:43:45
29Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2001-12-31 15:21:50
30BIANJ Letterhead CMYK_with_footer_resized_logo

BIANJ Letterhead CMYK_with_footer_resized_logo

Add to Reading List

Source URL: www.ugotbrains.com

Language: English - Date: 2014-12-01 16:46:46