Computer security software

Results: 11097



#Item
261Software / Computing / Web browsers / Internet privacy / Cross-platform software / News aggregators / Computer network security / HTTP cookie / Device fingerprint / JavaScript / Firefox / Google Chrome

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: securitee.org

Language: English - Date: 2013-03-11 10:59:39
262Computing / Internet / Internet Standards / Computer network security / MOVEit / DMZ / File Transfer Protocol / Ipswitch /  Inc. / FTPS / Password / Comparison of FTP client software / Email

MOVEit® DMZ Manual v7.5 Contents Contents

Add to Reading List

Source URL: ftps.maine.gov

Language: English - Date: 2013-02-03 12:55:26
263Software engineering / Computing / Computer programming / Applied Physics Laboratory / Johns Hopkins University / Laurel /  Maryland / APL programming language family / APL

APL Achievement Awards and Prizes Linda L. Maier-Tyler hallenges to our national security are increasing. Terrorism, climate and demographic changes, resource protection and cybersecurity, and the impact of extreme econo

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2016-04-15 14:57:49
264Computing / Computer network security / Computer security / Computer networking / Internet privacy / Network performance / Proxy server / Firewall / Stateful firewall / SOCKS

Greenshades Software hosts a variety of web pages that are intended for client use, such as GreenEmployee.com, GreenshadesOnline.com, and DownloadMyForm.com. Additionally, many of our software applications run on client-

Add to Reading List

Source URL: www.greenshades.com

Language: English - Date: 2015-10-14 12:18:54
265Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
266Computer network security / Computing / Virtual private networks / Computer architecture / Software / Network architecture / Internet privacy / Crypto-anarchism / Internet Connect / Point and click / SoftEther VPN / OpenVPN

Configure a VPN connection in Mac OS X The following guide is based on an English OS X Leopardbut with minor modifications the approach should work for other versions of OS X as well (For some versions it might b

Add to Reading List

Source URL: www.soc.ku.dk

Language: English - Date: 2016-08-22 10:32:30
267Computing / Information technology / System administration / Data security / Cloud infrastructure / Computer data / Information technology management / Sumo Logic / Cloud computing / Amazon Web Services / Big data / Logic Pro

CASE STUDY Greenhouse Software Greenhouse Software Recruits Top Candidates with Powerful Log Data Performance Organization

Add to Reading List

Source URL: www.sumologic.com

Language: English - Date: 2016-06-13 14:50:22
268Security / Computing / Systems engineering / Product development / Project management / Software development / Computer security / Functional requirement / Modularity

EXPRESSION OF INTEREST (EOI) On Re-engineering of PPIS

Add to Reading List

Source URL: dppr.gov.np

Language: English
269Software / Computer security / System software / Antivirus software / ESET NOD32 / ESET / Spyware / Malware / Avira / Computer virus / Comparison of antivirus software / Norton Internet Security

2014 EDITION Be Safer on the Internet Protect your Mac against malware, as well as Windows- and Linux-targeted threats. Stay clear of all types of malicious code, including viruses, worms, and spyware. Antivirus and An

Add to Reading List

Source URL: cdn3-prodint.esetstatic.com

Language: English - Date: 2016-07-26 04:26:21
270Security / Prevention / Computer security / Certificate authorities / Content-control software / Symantec / Password

Proven business platform with high ROI

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 09:23:43
UPDATE