Computer security software

Results: 11097



#Item
631Cybercrime / Computer recycling / Data security / Sales taxes in the United States / Personal computer / Computing / Recycling / Software / Computer / Reuse

Financial Policy ManualPLANT ASSETS - RETIREMENT OF COMPUTING EQUIPMENT Effective: October 2004 Revised: September 2009 Last Reviewed: March 2015

Add to Reading List

Source URL: www.finance.upenn.edu

Language: English - Date: 2015-08-05 11:18:18
632Software / Cryptographic software / Computing / Secure Shell / System software / Key management / Comparison of SSH servers / Ssh-agent / Ssh-keygen

ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Souppaya, Karen Scarfone, 1 and Larry Feldman, 2 Editors Computer Security Division Information Technol

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-01-11 10:13:44
633Security / Computer security / Computing / Software testing / Computer network security / Hacking / Cryptography / White hat / Vulnerability / Security testing / Security hacker / Penetration test

PENetration TESTING & ETHICAL HACKING SERVICES Are Your Information Security Measures Effective?

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:47:46
634Software quality / Source code / Ambient intelligence / Internet of things / Reliability engineering / Computer security / Quality assurance / Software engineering

Software Quality Days 2017 January 17th-20th 2017, Vienna, Austria Call for Papers Scientific Program https://2017.software-quality-days.com/vortragende/scientific-call-for-paper/

Add to Reading List

Source URL: 2017.software-quality-days.com

Language: English - Date: 2016-06-03 06:15:32
635Computing / Software engineering / Computer security / Web development / Internet privacy / Scripting languages / Hypertext Transfer Protocol / Computer network security / HTTP cookie / Cross-site scripting / Cross-site request forgery / Dynamic web page

WWWTrack: Security, Privacy, Reliability, and Ethics Session: Defending Against Emerging Threats Exposing Private Information by Timing Web Applications

Add to Reading List

Source URL: www.abortz.net

Language: English - Date: 2016-01-16 18:17:58
636Computer network security / Cyberwarfare / Markup languages / Cross-platform software / PHP / Application firewall / Web application firewall / ModSecurity / Firewall / Comment / Computer security

http://www.sektioneins.de Shocking News in PHP Exploitation 당신을 놀라게 할 충격적인 PHP 익스플로잇 기술들 Stefan Esser <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2010-03-01 13:38:20
637Microsoft / Software / Computer access control / Identity management / Password / Security / Login / Credential / Outlook.com

Microsoft Word - how to pull content from the PMP into Core Publisher March 2015.doc

Add to Reading List

Source URL: mediad.publicbroadcasting.net

Language: English - Date: 2015-04-07 15:50:00
638Data erasure / CCleaner / Freeware / Piriform / Rogue software / Spyware / Personal computer / Windows 7 / Windows Vista / Microsoft Windows

BENEFITS OF A CLEAN PC Background PCs whose hard disks are cluttered with unused and temporary files run more slowly than they should, while cookies and Internet history pose a risk to security and privacy. This document

Add to Reading List

Source URL: static.piriform.com

Language: English - Date: 2012-08-15 08:53:41
639Security / Computing / Information technology management / Information system / Computer security / Application software / Web development / Information technology consulting / ICDC College / Professional certification

WHAT CAN I DO WITH THIS DEGREE? COMPUTING & INFORMATION SYSTEMS (CIS) INTRODUCTION The College of Information Technology at University of Dubai offers a Bachelor Degree in Computing and Information Systems (CIS) that is

Add to Reading List

Source URL: www.ud.ac.ae

Language: English - Date: 2013-12-26 01:11:20
640Software / System software / Computer security / Computer viruses / Antivirus software / Deception / Internet security / Malware / Virus / Computer worm / Avira / Comparison of computer viruses

A Pact with the Devil Mike Bond and George Danezis Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, CB3 0FD, UK {Mike.Bond, George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
UPDATE