Application security

Results: 14395



#Item
831Computer network security / Security / Electronic commerce / Computing / Opc server / Technical communication / Computer security / OPC Foundation / Technology / Automation / Application programming interfaces

Wurldtech Expands The Achilles Platform May 18, 2009 Industrial Cyber-Security Pioneer Provides Testing And Certification Solutions To Proactively Diagnose, Mitigate And Manage Cyber Risk Throughout Upstream & Downstream

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:13
832Delhaize Group / Mega / Profi / Digital media / Application software / Electronic games / Video games developed in Japan / Mega Image / Windows games

CASE STUDY / MEGA IMAGE Document Security for Mega Image Bespoke bag designed to help Mega Image deliver documents between stores.

Add to Reading List

Source URL: www.versapak.co.uk

Language: English - Date: 2014-08-27 06:10:05
833Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
834Software / Spamming / Spam filtering / Anti-spam techniques / Simple Mail Transfer Protocol / Message transfer agent / Whitelist / Server / Internet Message Access Protocol / Email / Computing / Computer-mediated communication

Security and availability In cooperation with Denit and KPN Cyber Centre Hosting & Infrastructure The infrastructure of Carerix consist of database servers, application servers, webservers, mail servers, and various sub

Add to Reading List

Source URL: www.carerix.com

Language: English - Date: 2015-06-15 09:15:42
835Data security / ISO standards / Biometrics / Information sensitivity / Biometric passport / Extended Access Control / Common Criteria / Machine-readable passport / Contactless smart card / Security / National security / Passports

Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE (EAC PP) BSI-CC-PP-0056-V2Version 1.3.2, 05th December 2012)

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:25:03
836Protection Profile / Software / Security Target / Integrity / JavaScript / Evaluation / Computing / Common Criteria

JIL-Application-note-on-PP0084-v1-1

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-08-25 01:47:21
837Social programs / Government / Labour law / Unemployment benefits / Temporary Assistance for Needy Families / Unemployment / Income tax in Australia / Economics / Social security / Federal assistance in the United States / Socioeconomics

Financial Assistance Application OLYMPIC PENINSULA YMCA – Jefferson County Branch PLEASE ALLOW 1 WEEK FOR PROCESSING. DATE RECEIVED: _______________________________

Add to Reading List

Source URL: jeffersoncountyymca.org

Language: English - Date: 2014-11-07 19:13:25
838Social entrepreneurship / Social economy / Environment / Cultural economics / Grants / Philanthropy / Food security

FSRE-Fund Application Guideline Food Security and Rural Entrepreneurship Fund (FSRE-Fund) Application Guideline for

Add to Reading List

Source URL: agriprofocus.com

Language: English - Date: 2015-03-27 06:57:52
839Fee / Identity document / Visa Inc. / Identification / Business / Credit cards / Security / Credit card

Application for Copies of Examination Scripts ______________________________________________________________________________________ Important Information 1. You should complete this form if you wish to receive a copy of

Add to Reading List

Source URL: www.waikato.ac.nz

Language: English - Date: 2014-06-12 19:47:39
840

Poster: R-D ROID: In-depth Application Vetting for Android with Path-sensitive Value Analysis Michael Backes∗ , Sven Bugiel† , Erik Derr† , Sebastian Gerling† and Christian Hammer† ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:18
    UPDATE