Security software

Results: 17991



#Item
901Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Application security / Software development process / Software development

The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater∗‡ Rainer B¨ohme†

Add to Reading List

Source URL: weis2016.econinfosec.org

Language: English - Date: 2016-05-18 13:31:12
902Computing / Cloud computing / Business / Cloud infrastructure / Cloud storage / Software as a service / Cloud computing issues / IBM cloud computing

Multidimensional security policies

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-02-15 06:04:47
903Cryptography / Computer network security / Computer security / Transport Layer Security / Cryptographic software / Vulnerability / FREAK / OpenSSL / Exploit / Attack / Common Vulnerabilities and Exposures / Shellshock

Vulnerabilities At a glance Description A look into software vulnerabilities, whether we are

Add to Reading List

Source URL: www.kennasecurity.com

Language: English - Date: 2016-04-26 13:43:51
904Computer security / Advertising / Spamming / Antivirus software / Internet advertising / Internet bot / Blacklist / Whitelist / Video game bot / Targeted advertising / Geotargeting / DNSWL

Why Whitelist? How Common Approaches to Beating Bot Traffic Fall Short Introduction Within the digital advertising industry, waste caused by non-human traffic is a well-documented problem. One 2014 study

Add to Reading List

Source URL: www.areyouahuman.com

Language: English - Date: 2016-05-17 00:03:13
905Microsoft / Computing / Webmail / Software / Email / Password / Security / Outlook.com / Password notification email / Self-service password reset

My Student has Granted Me Access to FAMweb, What’s Next? 1. Create an account for FAMweb through the Parent and Family Programs website, to begin go to www.colostate.edu and select the “Parents & Family” tab at th

Add to Reading List

Source URL: parents.colostate.edu

Language: English - Date: 2015-09-04 12:45:32
906

Crypto Code The 9 circles of testing JP Aumasson, Kudelski Security Why it’s hard You need to know crypto and software

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2016-03-16 12:42:38
    907Software engineering / Computing / Software / Crime prevention / Cryptography / National security / Information governance / Secure communication / Perl / Computer security / Web development

    Secure Web Development In Perl Jonathan Worthington French Perl Workshop 2007

    Add to Reading List

    Source URL: jnthn.net

    Language: English - Date: 2014-10-21 09:51:16
    908Computing / Computer architecture / Software / Computer storage devices / File server / File system / Data / Clientserver model / Windows Server / Dropbox / Distributed file system for cloud

    IEEE Symposium on Security and Privacy, San Jose, CA, MayDynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign • The inform

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-05-08 03:51:53
    909

    Cryptography:   Security proofs Software-independence through secure function evaluation

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2014-03-17 13:57:21
      910Security engineering / Security / Computer security / Content-control software / Webroot / Endpoint security / Webroot Internet Security Essentials

      PROGRAM BRIEF Channel Edge ®

      Add to Reading List

      Source URL: webroot-cms-cdn.s3.amazonaws.com

      Language: English - Date: 2016-02-25 11:51:33
      UPDATE