Computer security software

Results: 11097



#Item
481Backup software / Computer memory / Business continuity and disaster recovery / Database management systems / Backup / Data security / Extensible Storage Engine / Computer data storage / Dynamic random-access memory / Replication / File system / In-memory database

Fast Crash Recovery in RAMCloud

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-11 16:39:07
482Mac OS / Password / Security / Finder

Setting up the Product on a personal computer*  * OS: Mac OS X (v10.6.8 or later)  (1) Download the latest FlashAir™ configuration software (Ver.2.00 or later) from the website below.  htt

Add to Reading List

Source URL: www.toshiba.co.jp

Language: English - Date: 2013-07-31 22:51:17
483Computer security / Computer network security / Data security / Application security / Certified Information Systems Security Professional / Enterprise software / Software / Web application security / HP Application Security Center

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today’s session – Understand different types of application

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:25
484Software testing / Cloud infrastructure / Automation / Test automation / Cloud computing / Landesbank Baden-Wrttemberg / Computer security

Baden-Württembergische_Bank_text_logo_black

Add to Reading List

Source URL: testobject.com

Language: English - Date: 2016-06-06 10:28:57
485Expert System S.p.A. / Modena / Translation software / Cogito / Cybercrime / National security / Computer security / Analysis

Corporate Presentation DIGITAL INVESTOR DAY Milano@Park Hyatt 5 Febbraioore 9.00

Add to Reading List

Source URL: aimnews.it

Language: English - Date: 2015-02-06 04:26:54
486Computer virus / Internet security / Password / Windows Vista / Antivirus software / Encrypting File System

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. Note: Rakhni creates

Add to Reading List

Source URL: www.nomoreransom.org

Language: English - Date: 2016-07-25 04:34:41
487Hacking / Software testing / Vulnerability / Computer security

Schedule UbiCrypt Summer School SYSTEMS SECURITY| July 20-23, 2015 Time 08:30-09:00 09:00-10:30 10:30-11:00 11:00-12:30

Add to Reading List

Source URL: www.ubicrypt.hgi.rub.de

Language: English - Date: 2015-07-10 06:56:20
488Cyberwarfare / Quality assurance / Software assurance / Software quality / National Security Agency / Computer security

Department of Defense (DoD) Joint Federated Assurance Center (JFAC) Overview

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-10-23 17:18:12
489Infrastructure / United States Department of Homeland Security / National security / Cyberwarfare / SoftQuad Software / XMetaL / Critical infrastructure protection / Critical infrastructure / Computer security

C:rsCKS~1DatamingtQuadtaL8CCAUL~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
490Computer access control / EMC Corporation / Access control / Computer security / Software distribution / RSA Security / RSA SecurID / Multi-factor authentication / Identity management / Single sign-on / Cloud computing / Provisioning

RSA Via Solution Overview

Add to Reading List

Source URL: www.rsa.com

Language: English - Date: 2016-03-14 08:22:34
UPDATE