John McAfee

Results: 14



#Item
1Computing / Software / Computer security / Antivirus software / Intel Security / Smartphones / Android / Mobile security / Ransomware / Mobile app / John McAfee

Report McAfee Labs Threats Report June 2016

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2016-06-13 16:14:00
2Libertarian Party presidential primaries / John McAfee / Libertarian Party presidential debates and forums / Libertarian Party / Austin Petersen / Libertarianism / United States presidential election in California

NAPA COUNTY STATEMENT OF VOTE:31:22 PM 1 OF 5

Add to Reading List

Source URL: www.countyofnapa.org

Language: English - Date: 2016-07-05 11:40:01
3

The unconventional truth with John McAfee Founder of McAfee Antivirus, Tribal Voice, Zone Labs and Future Tense Systems Topics

Add to Reading List

Source URL: www.rmisc.org

Language: English - Date: 2016-03-23 16:21:58
    4Hacking / Software testing / Computer network security / Vulnerability / Software bug / Malware / McAfee / Application security / Cyberwarfare / Computer security / Security

    Building an Effective Application Security Practice on a Shoestring Budget John Viega David Coffey

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    5McAfee / Companies listed on the New York Stock Exchange / Computer network security / Intranet / Data center / Productivity / Intel / Firewall / Computing / Technology / Concurrent computing

    IDC White Paper | Calculating the Business Value of Next Generation Firewall Sponsored by: Intel Security Authors: John Grady Randy Perry

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-10-14 18:48:03
    6Commerce / Business models / Broadcasting / Spectrum auction / Auction / NextWave Wireless / Bid / Mergers and acquisitions / United States 2008 wireless spectrum auction / Auction theory / Business / Auctioneering

    Journal of Economics and Management Strategy, 6:3, [removed], 1997 Synergies in Wireless Telephony: Evidence from the Broadband PCS Auctions* Lawrence M. Ausubel, Peter Cramton, R. Preston McAfee, and John McMillan Abstr

    Add to Reading List

    Source URL: www.ausubel.com

    Language: English - Date: 2012-09-06 19:36:37
    7Software / Unified Extensible Firmware Interface / Rootkit / System Management Mode / Malware / McAfee / Windows 8 / Computer security / System software / Computing / BIOS

    Platform Security Assessment with CHIPSEC https://github.com/chipsec/chipsec John Loucaides, Yuriy Bulygin

    Add to Reading List

    Source URL: cansecwest.com

    Language: English - Date: 2014-03-19 04:38:52
    8McAfee / Companies listed on the New York Stock Exchange / Computer network security / Intranet / Data center / Productivity / Intel / Firewall / Computing / Technology / Concurrent computing

    IDC White Paper | Calculating the Business Value of Next Generation Firewall Sponsored by: Intel Security Authors: John Grady Randy Perry

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2014-10-14 18:48:03
    9McAfee / John McAfee / Computing

    Seriously, John McAfee? SERIOUSLY?? WHERE IS HE NOW? On December 12th, 2012,

    Add to Reading List

    Source URL: chartgirl.com

    Language: English - Date: 2013-01-20 22:04:43
    10Computer hardware / Cloud computing / Smartphone / McAfee / Computing / Intel / Technology

    The Intel Science and Technology Center for Secure Computing Investing in New Levels of Academic Collaboration Matt Haycock, Intel Labs John Manferdelli, Intel Labs

    Add to Reading List

    Source URL: scrub.cs.berkeley.edu

    Language: English - Date: 2011-10-21 01:33:08
    UPDATE