Computer security software

Results: 11097



#Item
531Antivirus software / Personal computer / Computer virus / Trend Micro Internet Security

THE PS Project News ISSUE 10 March 02, 2011

Add to Reading List

Source URL: www.synergycentric.com.my

Language: English - Date: 2013-01-10 00:21:00
532Pharmaceutical industry / Validity / Areva / EPR / Computer security / Verification and validation / Validation / Software verification and validation

Cyber Security Engineering Did you know…AREVA offers a diverse team of cyber security engineering resources as an extension of your team? And we understand that the real success is in an ongoing relationship — one wh

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-06-29 11:30:38
533Product development / Manufacturing / Application software / Engineering / Embedded system / Software development / Computer-aided design / Integrated circuit design / Computer security / Computing / Mentor Graphics / Embedded intelligence

Engineering Media Targeting Mail In the engineering media of ITmedia, there are about 110,000 registered members belong to the manufacturing industries. The targeting mail service can deliver advertisers’ promotional m

Add to Reading List

Source URL: monoist.atmarkit.co.jp

Language: English - Date: 2016-07-11 22:07:39
534Cryptographic software / Functional languages / OCaml / Caml / Functional programming / Transport Layer Security / OpenSSL / LibreSSL / Preprocessor / Ctypes / Monad / Language binding

OCaml inside: a drop-in replacement for libtls Enguerrand Decorne (speaker), Jeremy Yallop, David Kaloper-Meršinjak University of Cambridge Computer Laboratory Introduction: openssl to libtls to libnqsb-tls

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-08-18 12:03:29
535Control flow / Cryptographic software / Internet security / Software bugs / Computer networking / Error code / Exception handling / Transport Layer Security / OpenSSL / Assertion / Error detection and correction / Crash

Automatically Detecting Error Handling Bugs using Error Specifications Suman Jana1 , Yuan Kang1 , Samuel Roth2 , and Baishakhi Ray3 1 Columbia University Northern University

Add to Reading List

Source URL: rayb.info

Language: English - Date: 2016-08-08 22:22:30
536Identity management / IBM Notes / NoSQL / Password / User / Computer security / End user / Password manager / Comparison of privilege authorization features

Lotus Notes And Domino Contribution to the HCI and Security Systems Workshop Dave Wilson IBM Software Group 5 Technology Park Drive Westford, MAUSA

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-02-05 13:11:40
537Ransomware / Antivirus software / McAfee / Spamming / Email / Email spam / CryptoLocker / Intel Security / McAfee SiteAdvisor / Computer virus / McAfee VirusScan / Malware

Threat Advisory: JS/Nemucod

Add to Reading List

Source URL: kc.mcafee.com

Language: English
538Antivirus software / Computer network security / Cyberwarfare / ESET / Malware / David Harley / Computer virus / Sality / Stuxnet / Computer security / Internet security / Avira

March 2015 Feature Article: 50 Shades of Security Table of Contents 50 Shades of Security .................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-06-02 02:58:26
539Computer network security / Fortinet / Computer security / Firewall / Virtual private network / Security / Network switch / Image segmentation / Software-defined protection / Virtual security switch

WHITE PAPER Internal Segmentation Firewall Security Where You Need It, When You Need It.

Add to Reading List

Source URL: www.fortinet.com

Language: English - Date: 2016-08-15 19:28:38
540Cyberwarfare / Cryptography / Crime prevention / National security / Computer network security / Dropper / Denial-of-service attack / Backdoor / Intel / Computer security / Malware / Recreational Software Advisory Council

SESSION ID: SPO1-T09 Christiaan Beek Disrupting Adversarial Success— Giving the Bad Guys No Sleep

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-02-28 09:30:14
UPDATE