Computer network security

Results: 18127



#Item
711Computer network security / Hacking / Software testing / Computer security / Vulnerability / Cross-site scripting / SQL injection / Program analysis / Web application security / Penetration test / Application security / Software bug

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2015-07-31 17:48:16
712Computing / Computer security / Cyberwarfare / Computer network security / Secure communication / Hacking / Software testing / Vulnerability / Resource fork / Firewall / Resource / Electronic filter

Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
713Security / Cyberwarfare / Computer network security / Computer security / Identity management / Crime prevention / Cryptography / National security / Privacy Impact Assessment / Spyware / Privacy / Internet privacy

Microsoft Word - GLS PIA acceptance.doc

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:49:32
714Computing / Wireless networking / IEEE 802.11 / Wireless / Wi-Fi / Computer network security / Technology / Local area networks / Wi-Fi Protected Access / Wireless access point / Password / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with the Droid (Android 2.x OS) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
715Computing / Software / System software / Ethernet / Computer networking / Virtual firewall / VM / Hyper-V / Network function virtualization / Hypervisor / Virtualization / Link aggregation

ITL BULLETIN FOR JUNE 2016 EXTENDING NETWORK SECURITY INTO VIRTUALIZED INFRASTRUCTURE Ramaswamy Chandramouli, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory Nationa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-06-02 17:23:03
716Cyberwarfare / Malware / Computer security / Computer network security / Deception / Rootkits / Zero-day / Computer virus / Ransomware / SentinelOne / Antivirus software / Computer worm

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
717Software / Computer security / System software / Antivirus software / Computer network security / ESET / Malware / Zero-day / Rootkit / Computer virus / ESET NOD32 / Avira

ESET_Logo_HorizontalClaim-Gradient-CMYK

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2016-02-05 06:51:51
718Computer security / Security / Cyberwarfare / Computer network security / Control engineering / Telemetry / Security controls / ICS / Industrial control system / Vulnerability / NIST Special Publication 800-53 / Incident Command System

ITL Security Bulletin, Tailoring Security Controls for Industrial Control Systems, (November 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-11-16 11:39:25
719Computer security / Software / System software / SentinelOne / Antivirus software / Computer network security / Malware / Carbon Black / IBM BigFix

Next-Generation Endpoint Protection What is Next-Generation Endpoint Protection? By now, you have probably heard

Add to Reading List

Source URL: sentinelone.com

Language: English - Date: 2016-05-23 00:25:29
720Cyberwarfare / Computer security / Computing / Malware / Computer network security / Computer viruses / Hacking / Zero-day / Botnet / Antivirus software / Vulnerability

THE MITRE CORPORATION THE MAEC™ LANGUAGE OVERVIEW DESIREE BECK, IVAN KIRILLOV, PENNY CHASE, MITRE JUNE 12, 2014

Add to Reading List

Source URL: maecproject.github.io

Language: English - Date: 2016-06-15 18:10:07
UPDATE