<--- Back to Details
First PageDocument Content
Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security
Date: 2014-01-21 02:20:33
Security
Malware
Vulnerability
Threat
Computer insecurity
Zero-day attack
Attack
Database security
Cloud computing
Computer network security
Cyberwarfare
Computer security

Add to Reading List

Source URL: www.mcafee.com

Download Document from Source Website

File Size: 1,73 MB

Share Document on Facebook

Similar Documents

Computing / Computer architecture / Software / Online marketplaces / Smartphones / Alphabet Inc. / Social networking services / Uniform Resource Locator / App Store / Mobile app / Google Play / IOS 9

Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu Abstract

DocID: 1uj0h - View Document

Measuring the Insecurity of Mobile Deep Links of Android Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang Department of Computer Science, Virginia Tech {fbeyond, wchun, andres, danfeng, gangwang}@vt.edu Abstract

DocID: 1u1f1 - View Document

Standards / P3P / Open standard / Standards organization / Professional certification / American National Standards Institute / Certification mark / Common Criteria / UL / Safety / Standardization / ISO

Security Watch Rebecca T. Mercuri Standards Insecurity Standards can provide an important component in the computer

DocID: 1pp8c - View Document

Famines / Food security / Urban agriculture / Supplemental Nutrition Assistance Program / Computer security

Student Food Insecurity: Predictors and Consequences

DocID: 1pcmf - View Document

Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

DocID: 1mndH - View Document