Computer security software

Results: 11097



#Item
541Computer network security / Computer security / Software architecture / Data security / Web application security / Firewall / Application security / Web application / Application firewall / Application server

Microsoft PowerPoint - ISSA Dallas Presentation.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:23
542Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Secure communication / Agile software development / Vulnerability / Application security / Software bug / Software

roguewave_automotive-developer-guide2016_vf

Add to Reading List

Source URL: www.roguewave.com

Language: English - Date: 2016-03-09 11:01:17
543Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
544Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
545Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
546Software bugs / Cryptography / Programming language implementation / National security / Memory safety / Software engineering / Vulnerability / Mbed TLS / Computer security / Computer memory / Pointer

Purdue University - Department of Computer Science Data Confidentiality and Integrity Scott A. Carr and Mathias Payer Motivation: void vulnerable() {

Add to Reading List

Source URL: scottandrewcarr.com

Language: English - Date: 2016-08-06 23:54:07
547Cybercrime / Crime prevention / ESET / David Harley / AutoRun / Antivirus software / Computer security / Computer virus / Malware / AVIEN / Technical support scam / ESET NOD32

May 2015 Feature Article: Nepal earthquake scam: out for a duck… Table of Contents Nepal earthquake scam: out for a duck… .............................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-10-06 04:33:11
548Proprietary software / Rogue software / Antivirus software / Computer network security / Identity theft / Spyware / Spybot  Search & Destroy / Microsoft Windows / Norton AntiVirus / Internet Explorer / Windows Vista

Personal InnoVia User Manual 3rd Edition

Add to Reading List

Source URL: www.ntreis.net

Language: English - Date: 2011-08-12 12:06:45
549Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing issues

In View Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2016-04-06 09:18:59
550University of New Mexico / V-12 Navy College Training Program / Application software / Computing / Dell / Internet / Computer security / Software

Information Technologies Factbook 2012

Add to Reading List

Source URL: cio.unm.edu

Language: English - Date: 2013-09-25 13:29:04
UPDATE