Computer security software

Results: 11097



#Item
591Engineering / Computing / Technology / Computer systems / Systems engineering / Cyber-physical system / Systems Modeling Language / Internet of things / Object Process Methodology / Computer security / Model-based testing / Systems design

Software and System Engineering for Cyber-Physical Systems: technical challenges and collaboration opportunities 26 January 2016 – IRIT Toulouse http://www.cpse-labs.eu/news_item6.php Workshop goals

Add to Reading List

Source URL: www.erts2016.org

Language: English - Date: 2016-01-07 12:52:40
592Software / System software / Computer architecture / Virtual memory / Memory management / Data compression / Data deduplication / Data management / Kernel same-page merging / X86-64 / Covert channel / Kernel

Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

Add to Reading List

Source URL: www.cs.wm.edu

Language: English - Date: 2013-05-30 14:58:15
593Computing / Computer security / Technology / Content-control software / Webroot / MicroAge / Malware / Intel / Internet of things

WEBROOT CUSTOMER CASE STUDY » MICROAGE MicroAge Partners with Webroot to Deliver Cloud-based Mobile Security BACKGROUND

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:21
594Computer access control / Software engineering / Software requirements / Identity management / Computer security / EduGAIN / TERENA / Requirement / Authentication / GANT

  05-­10-­2015   Deliverable  DJRA1.1:   Analysis  of  user  community  and  service  

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2015-10-07 16:41:13
595Computing / Software / Security / AlienVault / Help desk / OSSIM / Business software / Customer service / Issue tracking system / Technical support / Computer security

AlienVault Unified Security Management™ Solution Complete. Simple. Affordable Support Reference Guide Version 5.1 This document covers the following products:

Add to Reading List

Source URL: www.alienvault.com

Language: English - Date: 2016-03-21 19:44:04
596Software / System software / Computer security / Antivirus software / Content-control software / Webroot / Freeware / Malware / Computer virus / Avira / Webroot Internet Security Complete

WHITE PAPER > LOWERING MSP TCO ENDPOINT SECURITY SOLUTIONS Lowering MSP TCO for Endpoint Security Solutions Bottom-line Benefits of Cloud-based Antivirus Architecture

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:26
597Software / Computer architecture / System software / Linux kernel / Computing platforms / Patch / Xen / Dynamic software updating / Hypervisor / NetBSD / Security-Enhanced Linux / Loadable kernel module

Live Updating Operating Systems Using Virtualization ∗ Haibo Chen,Rong Chen,Fengzhe Zhang,Binyu Zang Parallel Processing Institute, Fudan University {hbchen,chenrong,fzzhang,byzang}@fudan.edu.cn

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
598Software testing / Reliability engineering / Test automation / Integration testing / Code coverage / High Efficiency Video Coding

ITL BULLETIN FOR MAY 2016 COMBINATORIAL TESTING FOR CYBERSECURITY AND RELIABILITY Rick Kuhn, Raghu Kacker, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-11 14:32:17
599Software engineering / Computer programming / Computing / Edsger W. Dijkstra / Computer security / Control-flow integrity / Subroutines / Control flow / Pointer / DynamoRIO / Goto / Stack

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
600Antivirus software / Computer network security / Content-control software / Webroot / Computer security / Endpoint security / SentinelOne / Carbon Black

ESG Brief Webroot’s Intelligent Approach to Endpoint Security Date: September 2015 Author: Doug Cahill, Senior Analyst; and Jon Oltsik, Senior Principal Analyst Abstract: The endpoint often plays a central role in the

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:28
UPDATE