Security software

Results: 17991



#Item
841Java platform / Computing platforms / Cross-platform software / Java / Hacking / Java security / Java Web Start / Sandbox / Vulnerability / Computer security / Android / Malware

Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua Sunshine Carnegie Mellon University {zfc,mmaass}@cs.cmu.edu, , {clegoues,sunshine}@cs.cmu.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2015-11-22 13:12:13
842Antivirus software / Personal computer / Computer virus / Trend Micro Internet Security

THE PS Project News ISSUE 10 March 02, 2011

Add to Reading List

Source URL: www.synergycentric.com.my

Language: English - Date: 2013-01-10 00:21:00
843Pharmaceutical industry / Validity / Areva / EPR / Computer security / Verification and validation / Validation / Software verification and validation

Cyber Security Engineering Did you know…AREVA offers a diverse team of cyber security engineering resources as an extension of your team? And we understand that the real success is in an ongoing relationship — one wh

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-06-29 11:30:38
844Product development / Manufacturing / Application software / Engineering / Embedded system / Software development / Computer-aided design / Integrated circuit design / Computer security / Computing / Mentor Graphics / Embedded intelligence

Engineering Media Targeting Mail In the engineering media of ITmedia, there are about 110,000 registered members belong to the manufacturing industries. The targeting mail service can deliver advertisers’ promotional m

Add to Reading List

Source URL: monoist.atmarkit.co.jp

Language: English - Date: 2016-07-11 22:07:39
845Antivirus software / Malwarebytes / Malware / Avira / IObit

C A S E S T U DY Vermeer deploys industrial-strength anti-malware detection The security team uses Malwarebytes Endpoint Security to remediate and prevent new malware infections while simplifying remote monitoring and s

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-06 12:46:25
846Cryptographic software / Functional languages / OCaml / Caml / Functional programming / Transport Layer Security / OpenSSL / LibreSSL / Preprocessor / Ctypes / Monad / Language binding

OCaml inside: a drop-in replacement for libtls Enguerrand Decorne (speaker), Jeremy Yallop, David Kaloper-Meršinjak University of Cambridge Computer Laboratory Introduction: openssl to libtls to libnqsb-tls

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-08-18 12:03:29
847Control flow / Cryptographic software / Internet security / Software bugs / Computer networking / Error code / Exception handling / Transport Layer Security / OpenSSL / Assertion / Error detection and correction / Crash

Automatically Detecting Error Handling Bugs using Error Specifications Suman Jana1 , Yuan Kang1 , Samuel Roth2 , and Baishakhi Ray3 1 Columbia University Northern University

Add to Reading List

Source URL: rayb.info

Language: English - Date: 2016-08-08 22:22:30
848Backup software / Business continuity and disaster recovery / Backup / Data security / Encryption / Druva Software / Asigra Cloud Backup

Mobile Marketing Brochure (New) - US

Add to Reading List

Source URL: www.keepitsafe.com

Language: English - Date: 2016-08-18 06:15:34
849Hacking / Blog software / WordPress / Security hacker / White hat / Exploit / Hacker groups

WordPress Security Don’t Be a Target Will Chatham @willc www.willchatham.com

Add to Reading List

Source URL: www.willchatham.com

Language: English - Date: 2016-06-03 22:29:26
850Cryptography / Cryptographic software / ISO standards / Hardware security module / Smart card / BitLocker / USB / Key / Secure Hash Algorithm / NSA Suite B Cryptography / Elliptic curve cryptography / Rosetta

PocketVault™ Smart USB 3.0 Dual Storage and Integrated Rosetta® PKI Smart Card Capability Protect the Key In Your Pocket PocketVault Smart USB 3.0 combines SSD storage with a Rosetta Hardware Security Module (HSM) to

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:26:38
UPDATE