Security software

Results: 17991



#Item
881Antivirus software / Malwarebytes / Malware / Avira / IObit / Bleeping Computer

C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
882Ambient intelligence / Internet of things / Industrial Internet Consortium / Computer security / Gateway / Jasper Technologies / SensorThings API

IoT Safety/Security Development Guidelines - Important Points to be understood by Software Developers toward the Smart-society Software Reliability Enhancement Center, Technology Headquarters, Information-technology Prom

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-07-29 00:54:20
883Hacking / Software testing / Computer network security / Vulnerability / Cross-site scripting / Computer security / SQL injection

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
884Software testing / Computer network security / Computer security / Penetration test / Vulnerability / Exploit / Attack / 0D

Intelligence Driven Security We are searching, with immediate effect, for highly motivated and technically competent Penetration Tester Red Teamer

Add to Reading List

Source URL: www.code-white.com

Language: English - Date: 2016-02-15 10:50:39
885Antivirus software / Malwarebytes / Malware / Avira / IObit / Bleeping Computer

C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 18:34:11
886Computer network security / Cross-platform software / FileZilla / Portable software / Password / Virtual private network / Outlook.com

How to get an access to the Main Storage System dapadfs Projects inside DAPA DAPA offer two different solutions for store data related to ongoing projects.  

Add to Reading List

Source URL: dapa.ciat.cgiar.org

Language: English - Date: 2015-02-20 09:16:32
887Computer security / Cross-platform software / Scripting languages / Computing platforms / Java platform / HDIV / JavaScript / Vulnerability / Cross-site request forgery / Java / Adobe ColdFusion / Application security

Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:19:01
888Cryptography / Disk encryption / Cryptographic software / Public-key cryptography / Data security / Encryption / Linear Tape-Open / IEEE P1619 / Symmetric-key algorithm / Magnetic tape data storage / Cipher / Key

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:31:20
889Election technology / Election Assistance Commission / Electronic voting / Voting system / Help America Vote Act / Software independence

Election.Security.Statement.EAC

Add to Reading List

Source URL: www.eac.gov

Language: English - Date: 2016-08-05 17:12:18
890Computer network security / Crime prevention / National security / E-commerce / Secure communication / Computer security / Vulnerability / Software

Microsoft PowerPoint - DenimGroup_RollingOutAnEnterpriseSourceCodeReviewProgram_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:49
UPDATE