Computer network security

Results: 18127



#Item
831Computing / Computer security / Security / Cyberwarfare / Computer network security / Sqrrl / Cybercrime / Apache Accumulo / Computer security incident management / Threat / Graph

  DATASHEET SQRRL ENTERPRISE USE CASE: INCIDENT RESPONSE &

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-03-07 12:41:51
832Computer network security / Computing / OWASP / Web application security / Sponsor

Science: It's a girl thing

Add to Reading List

Source URL: 2015.appsec.eu

Language: English - Date: 2015-03-18 13:14:53
833Computer network security / SentinelOne / Zero-day / Antivirus software / Malware / Palo Alto Networks / Computer security / Computer virus / Carbon Black / ForeScout Technologies

SC AWARDSExcellence Award Excellence Award

Add to Reading List

Source URL: go.cyphort.com

Language: English - Date: 2016-03-26 18:26:47
834Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 3rd Quarter ofJuly – September) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Re

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
835

COMPUTER EMERGENCY RESPONSE TEAM (CERT-LT) OF THE NETWORK AND INFORMATION SECURITY DEPARTMENT OF THE COMMUNICATIONS REGULATORY AUTHORITY OF THE REPUBLIC OF LITHUANIA COMPUTER EMERGENCY RESPONSE TEAM (CERT-LT) ANNUAL ACTI

Add to Reading List

Source URL: www.cert.lt

Language: English - Date: 2016-01-11 03:56:05
    836Computing / Security / Computer security / Prevention / Computer network security / E-commerce / Secure communication / National security / Payment Card Industry Data Security Standard / Cloud computing security / Cloud computing / Threat

    TH RE AT STA CK C LO UD SE C UR ITY P L AT FO RM T M A DVANCED ED ITION Ensure your data is safe. Threat Stack Cloud Security PlatformTM Advanced edition adds a new dimension to your

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-08 04:53:55
    837Security / Prevention / Safety / Computer security / National security / Data security / Computer network security / Cybercrime / Insurance / Vulnerability / Liability insurance / Threat

    In View Cybercrime – do you have it covered? Navigating the complex business of cybercrime insurance Technological advancements have

    Add to Reading List

    Source URL: www.nttcomsecurity.com

    Language: English - Date: 2016-02-04 09:08:48
    838Computing / Network architecture / Computer networking / Computer network security / Ethernet / Streaming / Network protocols / Middlebox / Multiprotocol Label Switching / Router / Network address translation / Forwarding plane

    SoftCell: Scalable and Flexible Cellular Core Network Architecture Xin Jin† , Li Erran Li? , Laurent Vanbever† , and Jennifer Rexford† Princeton University† , Bell Labs? ABSTRACT

    Add to Reading List

    Source URL: vanbever.eu

    Language: English - Date: 2013-11-04 08:44:37
    839Computer network security / Crimes / Deception / E-commerce / Entrust / Man-in-the-browser / Fraud / Datacard Group / Layered security / Authentication / Transaction verification

    +entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection

    Add to Reading List

    Source URL: www.entrust.com

    Language: English - Date: 2016-01-14 11:24:35
    840Computer network security / National Strategy for Trusted Identities in Cyberspace / Open Identity Exchange

    NSTIC Pilots: Catalyzing the Identity Ecosystem

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-04-13 11:03:53
    UPDATE