Computer security software

Results: 11097



#Item
431Software requirements / Systems engineering / Product development / Project management / Software development / Computer security / Functional requirement / Modularity / Requirement

EXPRESSION OF INTEREST (EOI) On Re-engineering of PPIS

Add to Reading List

Source URL: dppr.gov.np

Language: English
432Domain name system / Internet Standards / Internet protocols / Cyberwarfare / Computer network security / Domain Name System Security Extensions / Denial-of-service attack / Dan Kaminsky / Cloudmark / Internet security / Computer security / Comparison of DNS server software

Telecom/Datacom Market Fundamental Drivers

Add to Reading List

Source URL: www.cloudmark.com

Language: English - Date: 2014-11-13 13:40:39
433Ambient intelligence / Internet of things / Computer security / Machine to machine / Windows XP / Wind River Systems

Press Release Internet of Things Propels Embedded Software Security to New Heights, According to VDC Research Demand for security software is rising as device makers increasingly recognize the importance of security for

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:02
434Network architecture / Emerging technologies / Network function virtualization / Telecommunications systems / Computer network security / Outsourcing / Software-defined networking / Customer-premises equipment / Virtual private network / Cloud computing / Call centre / Customer experience

Technical Brief Randy Levensalor, Lead Architect, CableLabs, March 2016

Add to Reading List

Source URL: www.cablelabs.com

Language: English - Date: 2016-04-25 12:06:13
435Computer viruses / Comparison of computer viruses / Antivirus software / Robert Slade / Goodtimes virus / Michelangelo / SCA / Macro virus / Security hacker / Hare / Multipartite virus / Tuxissa

COMPUTER VIRUSES AND “FALSE AUTHORITY SYNDROME” 4TH EDITION © 1995,97 ROB ROSENBERGER; ALL RIGHTS RESERVED. INTERNET E-MAIL: WORLD WIDE WEB: http://www.kumite.com/myths ABSTRACT .......................

Add to Reading List

Source URL: vmyths.com

Language: English - Date: 2011-02-22 23:43:56
436Computer security / IT risk management / Information assurance / Logic Pro / Department of Defense Information Assurance Certification and Accreditation Process / Request Tracker / Software testing / Windows 8

highresRT_Logic-Kratos_Logo

Add to Reading List

Source URL: www.rtlogic.com

Language: English - Date: 2016-08-09 00:40:02
437OpenVAS / Crime prevention / Cryptography / Information governance / National security / Computer security / Vulnerability / Free software / Munich

Greenbone Case Study Vulnerability Management German Armed Forces University, Munich (Universität der Bundeswehr München) Greenbone Security Manager:

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
438Payment systems / E-commerce / Business software / Banking / Cheque / Numismatics / Payment / Point of sale / Bank / Overdraft / Clearing / Computer security

Transaction Services 9 October 2013 Technology Architecture & Strategy

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2013-10-09 03:12:04
439Antivirus software / Bitdefender / Avira / Avast Software / Malware / Intel Security / Computer security / Computer virus / Cache

- Virtualized In-Cloud Security Services for Mobile Devices Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:18
440Alphabet Inc. / Cloud applications / Google Docs /  Sheets /  Slides and Forms / Presentation software / Google Search / Black box / Computer security / Mobile phone / Google

Superhero’s Black Box For Emergencies… What’s in Yours? Brenda Norris Jason Letourneau

Add to Reading List

Source URL: www.nc-sis.org

Language: English - Date: 2016-02-01 15:52:48
UPDATE