Computer security software

Results: 11097



#Item
621Computer access control / Microsoft / Software / Computer security / Password / Security / Login / Registered user / Outlook.com / Form / Self-service password reset / Password fatigue

PDF Document

Add to Reading List

Source URL: www.ocr.gov.np

Language: English
622Software / Computer architecture / Computing / Android / Smartphones / Alphabet Inc. / App store / Mobile app / Google Play / Yo / Universal Windows Platform apps / Mobile security

PDF Document

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2015-11-16 12:12:35
623Computing / Identity management / Computer access control / Metadata standards / Security Assertion Markup Language / GARR / Software / Data

Authentication and Authorisation for Research and Collaboration JRA.14 Updates on MJRA1.3 Deliverable Davide Vaghetti

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 10:41:42
624Computer access control / Software / Computing / Computer security / Internet privacy / Hypertext Transfer Protocol / News aggregators / Proprietary software / HTTP cookie / Login / Password / Internet Explorer

FAQ for Login Assistance 1. Logging in for the first time? The default Login ID for users logging in the first time is your ‘NRIC/ passport’. Upon successful login, you will be required to change to your choice Login

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2016-03-21 03:17:05
625Security / Prevention / Safety / Vulnerability / Computer network security / Hacking / Software testing / Computer security / Patch / Social vulnerability

Leoni Veranstaltung

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-16 08:24:26
626Computing / Software / System software / Computer network security / Computer networking / Network management / Network performance / NetFlow / Deep packet inspection / Traffic flow / Berkeley Packet Filter / Firewall

goProbe: A Scalable Distributed Network Monitoring Solution Lennart Elsen, Fabian Kohn Open Systems AG {lel,fko}@open.ch Abstract—The Internet has developed into the primary

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-12-18 04:40:36
627Computing / Software engineering / Computer programming / Subroutines / Software bugs / C standard library / Uncontrolled format string / Printf format string / C POSIX library / C / Variadic function / Printf

USENIX Association Proceedings of the 10th USENIX Security Symposium Washington, D.C., USA

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-01-02 16:50:24
628Software / System software / Computing / MacOS / Computer access control / Windows / Directory services / Computer network security / Keychain / Kerberos / Active Directory / Single sign-on

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-05-25 18:19:43
629Computer programming / Software engineering / Computing / Computer security / Control-flow integrity / Code reuse / Return-oriented programming / Subroutine / Control flow / Flow graph / Pointer

Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer, Antonio Barresi, Thomas R. Gross ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
630Cryptography / Applied mathematics / Computer security / Advantage / Provable security / Cryptographic protocol / Data Encryption Standard / DolevYao model / NeedhamSchroeder protocol

A tool for automating the computationally complete symbolic attacker (Extended Abstract) Hubert Comon-Lundh V´eronique Cortier

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:52
UPDATE