Application security

Results: 14395



#Item
61On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

On Lightweight Mobile Phone Application Certification∗ † William Enck, Machigar Ongtang, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The

Add to Reading List

Source URL: www.patrickmcdaniel.org

- Date: 2016-11-26 07:36:40
    62A P P L I C AT I O N M A N AG E R FO R S CC M : DATA S H E E T  Reduce Endpoint Security Risk and Control Application Use Block Malware and Ransomware, Enforce License Agreements, and Control End User Privileges

    A P P L I C AT I O N M A N AG E R FO R S CC M : DATA S H E E T Reduce Endpoint Security Risk and Control Application Use Block Malware and Ransomware, Enforce License Agreements, and Control End User Privileges

    Add to Reading List

    Source URL: rs.shavlik.com

    - Date: 2016-10-07 11:40:25
      63Securing Your Web World  Application Provider Builds in Gateway Protection Trend Micro InterScan Web Security Virtual Appliance cost-effectively increases security without increasing complexity for IT.

      Securing Your Web World Application Provider Builds in Gateway Protection Trend Micro InterScan Web Security Virtual Appliance cost-effectively increases security without increasing complexity for IT.

      Add to Reading List

      Source URL: www.trendmicro.com

      - Date: 2012-10-09 01:04:40
        641  iMAS iOS Mobile Application Security  Gregg Ganley Gavin Black

        1 iMAS iOS Mobile Application Security Gregg Ganley Gavin Black

        Add to Reading List

        Source URL: media.blackhat.com

        - Date: 2013-07-31 03:51:56
          65DEPARTMENT OF HOMELAND SECURITY  U.S. Customs and Border Protection APPLICATION FOR IDENTIFICATION CARD 19 U.S.C. 66, 1551, 1555, 1565, 1624, 1641; 19 CFR, 118, , 146.6

          DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection APPLICATION FOR IDENTIFICATION CARD 19 U.S.C. 66, 1551, 1555, 1565, 1624, 1641; 19 CFR, 118, , 146.6

          Add to Reading List

          Source URL: cdn.portofportland.com

          - Date: 2016-09-08 17:09:30
            66International Journal of Security and Its Applications Vol.9, No), pphttp://dx.doi.orgijsiaRequirement of Security for IoT Application based on Gateway System

            International Journal of Security and Its Applications Vol.9, No), pphttp://dx.doi.orgijsiaRequirement of Security for IoT Application based on Gateway System

            Add to Reading List

            Source URL: www.sersc.org

            - Date: 2015-10-27 03:57:52
              67International Journal of Smart Home Vol. 9, No. 10, (2015), pphttp://dx.doi.orgijshStudy on the Vulnerability Level of Physical Security And Application of the IP-Based Devices

              International Journal of Smart Home Vol. 9, No. 10, (2015), pphttp://dx.doi.orgijshStudy on the Vulnerability Level of Physical Security And Application of the IP-Based Devices

              Add to Reading List

              Source URL: www.sersc.org

              - Date: 2015-11-05 00:13:03
                68Review of mVAM programme: novel application of mobile technologies for food security monitoring DISI – Development Information Services International August 2015

                Review of mVAM programme: novel application of mobile technologies for food security monitoring DISI – Development Information Services International August 2015

                Add to Reading List

                Source URL: documents.wfp.org

                - Date: 2015-11-02 09:27:04
                  69Application Security of Core Banking Systems A first reality check October 2012, Version 1.0.1 | A SEC Consult study in cooperation with

                  Application Security of Core Banking Systems A first reality check October 2012, Version 1.0.1 | A SEC Consult study in cooperation with

                  Add to Reading List

                  Source URL: www.sec-consult.com

                  - Date: 2015-12-29 07:48:01
                    70APPLICATION SECURITY IN THE CHANGING RISK LANDSCAPE RESEARCH SPONSORED BY F5 INDEPENDENTLY CONDUCTED BY

                    APPLICATION SECURITY IN THE CHANGING RISK LANDSCAPE RESEARCH SPONSORED BY F5 INDEPENDENTLY CONDUCTED BY

                    Add to Reading List

                    Source URL: f5.com