Computer security software

Results: 11097



#Item
321Software / Computing / Digital media / Social media / Social networking services / New media / Web 2.0 / Economy of Oregon / Pacific Northwest Economic Region / Twitter / Computer security

1 Social Media Grant  FEMA Port Security Grant, FY08 & FY12, Enhancing Maritime Security by Engaging Emergency Preparedness/Response Partners and the Public

Add to Reading List

Source URL: www.regionalresilience.org

Language: English - Date: 2016-04-26 13:56:02
322Computer security / Computing / Query languages / Cloud computing / Hadoop / Apache Software Foundation / Pig / Blacklist / Whitelist / TiVo Corporation

Administration Table of contents 1 Output location strict check............................................................................................... 2 2 Disabling Pig commands and operators.....................

Add to Reading List

Source URL: pig.apache.org

Language: English - Date: 2015-06-06 13:03:20
323Computer security / Computing / Security / Veracode / Software testing / Application security / Vulnerability / Cloud computing

HIGHLIGHTS A state government meets compliance requirements and reduces risk in a scalable application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-06-03 10:46:07
324Software / System software / Computer security / Antivirus software / Avast Software / Intel Security / Computer virus / Avira / Clam AntiVirus / F-Secure

- CloudAV N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:52
325Software / Computer security / System software / Antivirus software / Malwarebytes / Malware / Avira / Computer virus / Zero-day

C A S E S T U DY Knutson Construction builds better malware defenses Minnesota construction company uses Malwarebytes Anti-Malware to clean up serious malware outbreak

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 18:40:15
326System software / Software / Computer architecture / System administration / Setuid / Su / File system permissions / Passwd / Password / Home directory / Chsh / Fstab

Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut

Add to Reading List

Source URL: linux-training.be

Language: English - Date: 2015-05-24 09:28:07
327Computing / System software / Computer network security / Computer security / IP addresses / Computer networking / Data security / PfSense / Proxy server / Private network / Firewall / Subnetwork

Zeroshell as filtering bridge with connection tracking log and HAVP proxy I have already used and administrated several Firewall distributions, like IP-Cop, PFSense, Monowall, RouterOS, OpenWRT, DD-WRT, but none of them

Add to Reading List

Source URL: www.zeroshell.net

Language: English - Date: 2011-12-28 16:45:43
328Hacking / Software testing / Vulnerability / Computer security / Cyberwarfare / Risk

Security Sub-Committee (SSC) Charter Version 1.0.1, April 21, 2015 This work is licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0/ Unless otherwise noted,

Add to Reading List

Source URL: wiki.allseenalliance.org

Language: English - Date: 2016-04-11 14:41:58
329Computing / Internet / Cryptography / Computer network security / Internet Standards / Directory services / Cryptographic protocols / Secure communication / Safe Software / Kerberos / Transport Layer Security / HTTPS

FME® Server Security Table of Contents FME Server Authentication - Access Control

Add to Reading List

Source URL: cdn.safe.com

Language: English - Date: 2015-07-30 16:36:24
330Software development / Software engineering / Software / Hypertext Transfer Protocol / Session / World Wide Web / Version control

University of Birmingham Computer Science Programme Timetable: MSc Cyber Security

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2016-04-28 08:42:05
UPDATE