Computer security software

Results: 11097



#Item
651Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

Add to Reading List

Source URL: www.is.uni-muenster.de

Language: English - Date: 2012-12-21 05:49:44
652Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / SQL injection / Cross-site scripting / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 4th Quarter ofOctober – December) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-03-17 21:00:12
653Computer security / Computing / Computer network security / Software / Antivirus software / Sophos / Cyberoam / Application firewall / Firewall / Yamaha XG / Solid-state drive / Comparison of firewalls

Sophos XG Firewall Unrivalled performance, security and control Sophos XG Firewall takes an innovative approach across all areas of network security. From the way firewalls are managed, to the way they report information

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-03-01 11:43:42
654Cyberwarfare / Computer security / Security / Computer network security / Software testing / Hacking / Cryptography / Secure communication / Vulnerability

Subject: Request to Attend Trail of Bits Training Dear [DECISION MAKER], I would like to request approval to attend a Trail of Bits training course, taking place from [DATES] in [CITY]. The program offers comprehensive,

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:18
655Software / Computer architecture / System software / System calls / Inter-process communication / Application programming interfaces / Kernel / Seccomp / HAL / Chroot / Sandbox / Potential applications of graphene

Cooperation and Security Isolation of Library OSes for Multi-Process Applications Chia-Che Tsai Kumar Saurabh Arora Nehal Bandi Bhushan Jain

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2014-03-28 07:32:49
656Web browsers / Internet privacy / Cross-platform software / News aggregators / Computer network security / HTTP cookie / Device fingerprint / JavaScript / Firefox / Adobe Flash / Google Chrome / Privacy mode

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: seclab.cs.ucsb.edu

Language: English - Date: 2013-03-11 18:50:23
657Software / Computing / Application software / Internet privacy / Network architecture / SCADA / Computer network security / Humancomputer interaction / Virtual private network / WinCC / Usability / Accessibility

Position Software Engineer (Visualization) (m/f) Reporting to

Add to Reading List

Source URL: www.apateq.com

Language: English - Date: 2015-07-31 10:56:11
658Computing / Security / Business / Computer network security / Cloud computing / Computer security / Cloud infrastructure / Multitenancy / Software as a service / Security controls

Ashit Vora Manager, Security Assurance, Cisco Systems, Inc. September 18, 2012 IT resources and services that are abstracted from the underlying

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-06 07:18:36
659Affiliate marketing / E-commerce / Computer network security / Heimdal / Affiliate network / Internet privacy / Antivirus software / Computer security / Privacy

Affiliate Agreement Affiliate Agreement Our affiliates are very important to us. We do our best to treat you with the fairness and

Add to Reading List

Source URL: heimdalsecurity.com

Language: English - Date: 2015-10-16 03:47:28
660Computing / ISO standards / Security / Software / Common Criteria / Cyberwarfare / Linux kernel / Kernel / Operating system / Computer security / Smart card / Toe

ICCC13 Brightsight Swieten Revised TSFI definition

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-25 07:21:09
UPDATE