Computer security software

Results: 11097



#Item
471Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: it.malwarebytes.com

Language: English
472Computer network security / Identity theft / Antivirus software / Computer virus / Deception / Internet security / Security hacker / Hackers: Heroes of the Computer Revolution / Computer security / Hacker culture / Intel Security / Malware

A Survey Scale to Measure Computer Security Beliefs

Add to Reading List

Source URL: www.usenix.org

Language: English
473Antivirus software / Malwarebytes / Malware / Computer virus / Avira / Zero-day

C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2016-07-07 18:32:31
474Software testing / Codenomicon / Fuzz testing / Computer security / Vulnerability / American fuzzy lop

Fuzzing Practical Considerations Of Fuzzing: Generating Insight into Areas of Risk Jonathan Knudsen

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:34
475Archive formats / Dpkg / Ubuntu / Debian / Package manager / Software distribution / Yellowdog Updater /  Modified / Arch Linux / Software repository / RPM Package Manager / Deb / Portage

Package Management Security Justin Cappos, Justin Samuel, Scott Baker, John H. Hartman University of Arizona Computer Science Department {justin, jsamuel, bakers, jhh}@cs.arizona.edu

Add to Reading List

Source URL: isis.poly.edu

Language: English - Date: 2012-09-11 18:21:25
476Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
477Computer network security / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Computer security / Computing / Software / Defensive computing / Sumter County Library /  FL

Internet Access Policy Adopted by the Library Board Of Trustees Effective: March 17, 2015

Add to Reading List

Source URL: www.myepl.org

Language: English - Date: 2015-03-20 14:17:59
478Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
479Cryptography / Computer network / Telecommunications engineering / Database / Computing / Application software / Cloud computing / Operating system / Personal computer / Computer science / Computer security / Mainframe computer

DSST EXAM CONTENT FACT SHEET DSST® COMPUTING AND INFORMATION TECHNOLOGY EXAM INFORMATION This exam was developed to enable schools to award credit to students for knowledge equivalent to that

Add to Reading List

Source URL: getcollegecredit.com

Language: English - Date: 2016-07-06 09:01:13
480Nftables / Netfilter / Iptables / Network management / Computer network security / Discontinued software / Routing / Network performance / Network address translation / NuFW / Netlink / Firewall

nftables, far more than %s/ip/nf/g Éric Leblond Nefilter Coreteam September 24, 2013

Add to Reading List

Source URL: home.regit.org

Language: English - Date: 2013-09-24 09:43:52
UPDATE