Computer network security

Results: 18127



#Item
801Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Zero-day

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2nd Quarter ofApril – June) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Respon

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
802

A Tune-up for Tor: Improving Security and Performance in the Tor Network Robin Snader Department of Computer Science University of Illinois at Urbana–Champaign Nikita Borisov

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 08:34:00
    803Computer network security / Computer security / Cyberwarfare / OWASP / Computing / Application security / WebScarab

    The New OWASP Testing Guide v4 Matteo Meucci OWASP Testing Guide Co-lead 17th March 2015 – Security Summit - OWASP-Italy

    Add to Reading List

    Source URL: www.securitysummit.it

    Language: English - Date: 2015-04-08 09:33:42
    804Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

    A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

    Add to Reading List

    Source URL: www.is.uni-muenster.de

    Language: English - Date: 2012-12-21 05:49:44
    805Internet privacy / Computing / Data security / Identity management / Privacy / Computer security / Privacy policy / HTTP cookie / Information privacy / Privacy concerns with social networking services / Privacy concerns regarding Google

    Privacy Policy Introduction - how we use your information The Mark Allen Group (MAG) includes the following companies MA Music & Leisure Ltd (MAML), MA Business Ltd (MAB), Airport Publishing Network (APN), MA Healthcare

    Add to Reading List

    Source URL: assets.markallengroup.com

    Language: English - Date: 2016-04-01 02:27:51
    806Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Benjamin Kunz Mejri

    Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

    Add to Reading List

    Source URL: www.ipa.go.jp

    Language: English - Date: 2016-03-17 21:00:12
    807Computer security / Computing / Computer network security / Software / Antivirus software / Sophos / Cyberoam / Application firewall / Firewall / Yamaha XG / Solid-state drive / Comparison of firewalls

    Sophos XG Firewall Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information

    Add to Reading List

    Source URL: i.crn.com

    Language: English - Date: 2016-03-01 11:43:42
    808Cyberwarfare / Computer security / Security / Computer network security / Software testing / Hacking / Cryptography / Secure communication / Vulnerability

    Subject: Request to Attend Trail of Bits Training Dear [DECISION MAKER], I would like to request approval to attend a Trail of Bits training course, taking place from [DATES] in [CITY]. The program offers comprehensive,

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:18
    809Computer security / Cybercrime / National security / Computer network security / Cyberwarfare / Fox-IT / Threat / Supply chain attack / Outline of computer security

    Fox-IT vormtaal patroon-0,3 cmyk

    Add to Reading List

    Source URL: www.fox-it.com

    Language: English - Date: 2016-02-28 10:36:02
    810Computing / Technology / Computer network security / Security / Industrial Internet Consortium / Cisco Systems / Computer security / Virtual private network / Internet of things

    INDUSTRIAL INTERNET IN ACTION CASE STUDY Global Manufacturer uses remote access cybersecurity to maintain safety at its manufacturing production zones

    Add to Reading List

    Source URL: www.iiconsortium.org

    Language: English - Date: 2015-08-13 10:15:56
    UPDATE