Marc Stiegler

Results: 12



#Item
1Software / System software / Computing / Rogue software / Computer viruses / Deception / Internet security / Macro virus / Spyware / Antivirus software / Microsoft Windows / File dialog

Polaris: Usable Virus Protection for Windows Ka-Ping Yee Marc D. Stiegler, Alan H. Karp, Tyler Close Mark S. Miller

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
2

E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Add to Reading List

Source URL: www.cypherpunks.to

- Date: 2008-03-14 04:36:20
    3

    E Fundamentals… with Donuts Marc Stiegler Visiting Scholar, HP © 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

    Add to Reading List

    Source URL: www.cypherpunks.to

    Language: English - Date: 2008-03-14 04:36:20
      4Cyberwarfare / CapDesk / Principle of least privilege / Vulnerability / Firewall / JavaScript / Computer network security / Computer security / Computing

      BAASNK BY FOCUSED RESEARCH TOPIC 5 MARC STIEGLER AND MARK MILLER

      Add to Reading List

      Source URL: www.combex.com

      Language: English - Date: 2005-08-18 16:57:04
      5Macroeconomics / Keynesian economics / Economic theories / Fellows of the Econometric Society / Classical liberals / Paul Krugman / John Maynard Keynes / The General Theory of Employment /  Interest and Money / Milton Friedman / Economics / British people / Conservatism in the United States

      KrugmanLand by Marc Stiegler Copyright 2014, Marc Stiegler. All rights reserved.

      Add to Reading List

      Source URL: www.skyhunter.com

      Language: English - Date: 2014-01-25 22:24:26
      6Computer crimes / Phishing / Spamming / Password / Transaction authentication number / Two-factor authentication / Login / Authentication / Security / Access control / Social engineering

      Phishing Prevention with Hybrid Authentication/Authorization Marc Stiegler Abstract Phishing is now widely recognized as the number one threat to the enterprise.Two Factor Authentication, the supposed solution to this am

      Add to Reading List

      Source URL: skyhunter.com

      Language: English - Date: 2014-01-27 12:48:27
      7Stiegler / Shapiro / Concurrency control / Object-capability model / Data / Information / Computing / Year of birth missing / CapDesk / Marc Stiegler

      Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

      Add to Reading List

      Source URL: www.erights.org

      Language: English - Date: 2006-09-01 02:03:44
      8Electronics / Email / Technology / Digital media

      Rich Sharing for the Web Marc Stiegler HP Laboratories HPLKeyword(s): secure cooperation, usable security

      Add to Reading List

      Source URL: www.hpl.hp.com

      Language: English - Date: 2009-07-21 21:46:00
      9Stiegler / Shapiro / Concurrency control / Object-capability model / Data / Information / Computing / Year of birth missing / CapDesk / Marc Stiegler

      Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2006-09-01 02:03:44
      10Antivirus software / Computer virus / Malware / Macro virus / CapDesk / Microsoft Windows / Spyware / Microsoft Excel / Principle of least privilege / System software / Software / Computing

      Polaris: Toward Virus Safe Computing for Windows XP Marc Stiegler, Alan H. Karp, Ka-Ping Yee1, Mark Miller2 Hewlett-Packard Laboratories Palo Alto, California Viruses, those nasty pieces of software that can run when you

      Add to Reading List

      Source URL: www.hpl.hp.com

      Language: English - Date: 2004-12-13 10:58:46
      UPDATE