Computer security software

Results: 11097



#Item
251Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Data security / Information security / Systems engineering / Computer security

Master of Science Program in Information Technology Degree RequirementsIT 5413 Software Design and Development IT 5443 Web

Add to Reading List

Source URL: ccse.kennesaw.edu

Language: English - Date: 2015-08-15 14:09:11
252Computing / Software engineering / Computer security / Cryptography / Trusted computing / Smart cards / Trusted Platform Module / Closure / Variable / Java Card / Subroutine / Trusted Execution Technology

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-06-16 20:15:44
253Epidemiology / Physics / Medicine / Vaccination / Cyberwarfare / Computer network security / Computer security / Threat / Faster-than-light / Infection / Influenza / Malware

Internet wormholes Can security patches travel faster than light? A reliable strategy for controlling the propagation of malicious software has become and will likely remain the Holy Grail of network security in the fore

Add to Reading List

Source URL: www.monmeetings.org

Language: English - Date: 2015-09-04 10:25:02
254Software / Antivirus software / Computer security / System software / Bitdefender / Kaspersky Lab / Benchmark / Standard Performance Evaluation Corporation / Avast Software / Panda Security / PCMark / Norton

Document: Authors: Company: Date: Edition: File:

Add to Reading List

Source URL: passmark.com

Language: English - Date: 2015-05-26 20:12:52
255Computing / Computer network security / Cloud infrastructure / Cloud computing / Computer security / Computer networking / Serena Software / Software as a service / ITIL / Multitenancy / Application security / Security service

SERENA SOFTWARE Serena Service Manager Security in the Cloud Author: Amitav Chakravartty

Add to Reading List

Source URL: www.serena.com

Language: English - Date: 2013-01-10 16:22:05
256Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Rootkit / IObit

C A S E S T U DY Sioux County roots out malware Malwarebytes helps county government secure endpoints and meet compliance requirements while increasing IT productivity Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
257Computer security / Software / System software / Antivirus software / Cyberwarfare / Freeware / Computer virus / Deception / Internet security / Malware / Rootkit / Avira

D-OGS Newsletter – March 2011 News & Articles of Interest to Durham-Orange genealogists PO Box 4703, Chapel Hill, NCdues – $20 Sue McMurray - President

Add to Reading List

Source URL: dogsnc.org

Language: English - Date: 2014-11-02 21:31:56
258Microsoft / Computer access control / Software / Password / Security / Login / Outlook.com / Self-service password reset / Password fatigue

Reset Your Password You will need the email associated with your account! 1. Access the ISAS website at http://ilacadofsci.com/ 2. Click on the Sign In link, just as if you were signing in. 3. Since you don’t remember

Add to Reading List

Source URL: ilacadofsci.com

Language: English - Date: 2013-12-02 19:39:14
259Software engineering / Theoretical computer science / Logic / Logic programming / Models of computation / Functional languages / Computability theory / Lambda calculus / Substitution / Standard ML / Higher-order abstract syntax / Security type system

c 2005 Cambridge University Press JFP 15 (6), Meta-Programming through Typeful

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2005-06-23 21:20:00
260Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
UPDATE