Computer security software

Results: 11097



#Item
291Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Shibboleth / Security Assertion Markup Language / SPNEGO / Identity provider / Kerberos / SAML-based products and services

Shibboleth Identity Provider (IdP) Version 3 Feature Update www.overtsoftware.com ©2016 Overt Software Solutions Ltd. All Rights Reserved

Add to Reading List

Source URL: www.overtsoftware.com

Language: English - Date: 2016-01-14 08:16:27
292Security / Computer security / Antivirus software / Cylance Inc.

CONSULTING YOU INVESTED IN ADVANCED THREAT PROTECTION. LET CYLANCE CONSULTING OPTIMIZE AND OPERATIONALIZE YOUR INVESTMENT. ThreatZERO™ Addresses Unique Challenges 

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-08-04 11:59:54
293Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
294Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / Zero-day / Computer virus / IObit / Bleeping Computer

C A S E S T U DY City of Westfield evicts malware Local government uses Malwarebytes to keep city employees running at peak performance Business profile

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 18:42:41
295Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
296Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

trust claims buffer overrun tokens

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:40
297Software engineering / Computer programming / Computing / Subroutines / Computer security / Software bugs / Memory management / Return-oriented programming / Control-flow integrity / Control flow / Call stack / Gadget

2015 IEEE Trustcom/BigDataSE/ISPA Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2016-04-22 03:46:05
298Software / Computing / Computer architecture / Compilers / Instruction set architectures / Programming language implementation / Machine code / GNU Compiler Collection / X86 / Assembly language / LLVM / NOP

SACK: a Semantic Automated Compiler Kit Colby T. Skeggs Applications o Rapid architecture testing o Automatically-generated architectures: o For security

Add to Reading List

Source URL: www.celskeggs.com

Language: English
299Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Software project management / Computer security / Abuse case / Vulnerability / Andreas Lothe Opdahl

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Web Site: www.ijettcs.org Email: , Volume 3, Issue 2, March – April 2014 ISSNMea

Add to Reading List

Source URL: www.ijettcs.org

Language: English - Date: 2014-05-13 04:33:09
300Software / Computer security / Cyberwarfare / Antivirus software / Malwarebytes Anti-Malware / Malware / Ransomware / Computer virus / Rootkit / Zero-day / Avira / IObit

C A S E S T U DY Electrical contracting firm short-circuits malware threats Briggs Electric uses Malwarebytes to remediate CryptoLocker and prevent malware from shocking its systems

Add to Reading List

Source URL: fr.malwarebytes.com

Language: English - Date: 2016-07-07 18:35:52
UPDATE