Computer security software

Results: 11097



#Item
491Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
492Computer security / Computer network security / Application security / Software testing / Application firewall / Mobile security / Fortify Software / Vulnerability / Software as a service

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
493Cross-platform software / Object-oriented programming languages / Programming languages / Java platform / Pointer / Vulnerability / Java / Computer security / Software / Computer programming / Buffer overflow / Mobile security

Building Code for Medical Device Software Security Tom Haigh and Carl Landwehr READ ON!

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2015-07-23 13:16:04
494Computer network security / Computer security / Cybercrime / National security / Antivirus software / Malware / Threat

Presentation Eric HOUDET Mission Statement: Quarkslab mission is to protect sensitive data for companies facing highly sophisticated cyber-attacks. Therefore, we provide

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-08 10:31:21
495Information technology management / National security / E-commerce / Computer network security / Computer security / Cryptography / Software / Business process management

Microsoft Word - This Time The Gathering Storm is Digital.doc

Add to Reading List

Source URL: ontopilot.com

Language: English - Date: 2016-03-21 13:58:05
496Software quality / Design for X / Symposium on Principles of Programming Languages / Reliability engineering / Computer security / Software / Fly-by-wire

Verified squared: does critical software deserve verified tools? Xavier Leroy INRIA Paris-Rocquencourt POPL 2011

Add to Reading List

Source URL: pauillac.inria.fr

Language: English - Date: 2011-02-02 12:03:33
497Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
498Software testing / Computer security / Program analysis / Static / Application security / FxCop / FindBugs / Worst-case execution time

Microsoft PowerPoint - DenimGroup_StaticAnalysisTechniquesForTestingApplicationSecurity_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
499Antivirus software / Malwarebytes / Malware / Ransomware / Computer virus / IObit / SentinelOne

DATA S H E E T Malwarebytes Endpoint Security Advanced threat prevention Malwarebytes Endpoint Security is an endpoint protection platform

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-17 18:03:01
500Cryptography / Crime prevention / Information governance / National security / Data security / Common Criteria / Electronic voting / Information security / Computer security

Inside Risks Rebecca Mercuri Uncommon Criteria he software development process can benefit from the use of established standards and procedures to assess compliance with specified

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:30:03
UPDATE