Security software

Results: 17991



#Item
931Software / Computing / Memory management / Binary translation / System call / Call stack / Just-in-time compilation / Ioctl / Kernel / Self-modifying code / DynamoRIO / Subroutine

Fine-Grained User-Space Security Through Virtualization Mathias Payer Thomas R. Gross

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
932Antivirus software / Computer security / Spamming / Malware / Whitelist / Computer virus / Application software / Software / Privacy software / DriveSentry

ITL Bulletin December 2015, Stopping Malware and Unauthorized Software through Application Whitelisting

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-12-14 08:58:39
933Computing / Software / System software / Ethernet / Computer networking / Virtual firewall / VM / Hyper-V / Network function virtualization / Hypervisor / Virtualization / Link aggregation

ITL BULLETIN FOR JUNE 2016 EXTENDING NETWORK SECURITY INTO VIRTUALIZED INFRASTRUCTURE Ramaswamy Chandramouli, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory Nationa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 17:23:03
934Cryptographic protocol / DolevYao model / Communications protocol / Decidability / Philosophy / Abstraction / Computing

On Well-founded Security Protocols (Extended Abstract) Sibylle Fr¨oschle OFFIS & University of Oldenburg, Germany Email: Consider the decidability problem that stands behind

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
935

Crypto Code The 9 circles of testing JP Aumasson, Kudelski Security Why it’s hard You need to know crypto and software

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2016-03-18 09:04:19
    936Cyberwarfare / Malware / Computer security / Computer network security / Deception / Rootkits / Zero-day / Computer virus / Ransomware / SentinelOne / Antivirus software / Computer worm

    Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

    Add to Reading List

    Source URL: www.sentinelone.com

    Language: English - Date: 2016-05-23 01:13:39
    937Software / Computer security / System software / Antivirus software / Computer network security / ESET / Malware / Zero-day / Rootkit / Computer virus / ESET NOD32 / Avira

    ESET_Logo_HorizontalClaim-Gradient-CMYK

    Add to Reading List

    Source URL: static3.esetstatic.com

    Language: English - Date: 2016-02-05 06:51:51
    938Computing / Internet / Internet privacy / Internet security / Internet protocols / Secure communication / Content-control software / Internet censorship in China / Tor / Proxy server / Internet censorship circumvention / SOCKS

    How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

    Add to Reading List

    Source URL: www.cs.kau.se

    Language: English
    939Computer security / Software / System software / SentinelOne / Antivirus software / Computer network security / Malware / Carbon Black / IBM BigFix

    Next-Generation Endpoint Protection What is Next-Generation Endpoint Protection? By now, you have probably heard

    Add to Reading List

    Source URL: sentinelone.com

    Language: English - Date: 2016-05-23 00:25:29
    940Security / Crime prevention / Cryptography / National security / Information governance / Computer security / Information security / Password / Paul Dourish / Internet privacy / Security hacker / Outline of computer security

    Institute for Software Research University of California, Irvine Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem

    Add to Reading List

    Source URL: www.dourish.com

    Language: English - Date: 2008-06-14 12:49:22
    UPDATE