Security software

Results: 17991



#Item
921Cryptography / Computer security / Microsoft Windows / Cryptographic software / Trusted computing / Disk encryption / Windows Vista / Trusted Platform Module / BitLocker / Unified Extensible Firmware Interface / Booting / Trusted Computing Group

Advanced  x86:   BIOS  and  System  Management  Mode  Internals   Trusted  Compu-ng  Technologies   Xeno  Kovah  &&  Corey  Kallenberg   LegbaCore,  LLC  

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-10-14 22:12:02
922Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
923Cryptographic software / Hardware virtualization / Heartbleed / Internet security / Transport Layer Security / OpenSSL / Hypervisor / Hyper-V / Protection ring / Second Level Address Translation / Rootkit / Operating system

Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia Shanghai Key Laboratory of Scalable Computing and Systems & Institute of Par

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2015-08-16 21:09:13
924Computer network security / Hacking / Software testing / Computer security / Vulnerability / Cross-site scripting / SQL injection / Program analysis / Web application security / Penetration test / Application security / Software bug

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2015-07-31 17:48:16
925Economy / Business / Software / Password / Security / Scheduling / Microsoft Word

Starting April 16, 2001 you will have to use the new on-line scheduling tool. The link http://faces.ccrc.uga.edu/ should take you there, if not cut and paste in your browser. As a previous user you should have received a

Add to Reading List

Source URL: amcl.mst.edu

Language: English - Date: 2014-01-22 05:23:59
926Computing / Computer security / Cyberwarfare / Computer network security / Secure communication / Hacking / Software testing / Vulnerability / Resource fork / Firewall / Resource / Electronic filter

Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
927Cryptography / Software / Computer security / OpenPGP / Cryptographic software / Computer access control / USB / YubiKey / Gpg4win / GNU Privacy Guard / Public-key cryptography / Encryption

GnuPG Installation, Key Generation, & Decryption

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-12-15 16:56:28
928

Software Security Hardware Firmware Applications       OS  

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2014-03-17 15:07:12
    929

    OT acquires Xantium and strengthens its leadership position on African Continent Colombes, France, May 18, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products, services and

    Add to Reading List

    Source URL: www.oberthur.com

    Language: English - Date: 2016-05-18 04:53:14
      930Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

      Analysis of a Measured Launch

      Add to Reading List

      Source URL: evenmere.org

      Language: English - Date: 2008-06-23 13:59:25
      UPDATE